| | 1 - 3 - History of cryptography (19 min).mp4 | 20.47 MB |
| | 1 - 4 - Discrete probability (16 min).mp4 | 17.46 MB |
| | 1 - 2 - What is cryptography- (15 min).mp4 | 17.01 MB |
| | 1 - 1 - Course Overview (11 min).mp4 | 11.72 MB |
| | 01.3-intro-annotated.pdf | 1.39 MB |
| | 01.2-intro-annotated.pdf | 866.09 KB |
| | 01.4-intro-annotated.pdf | 307.92 KB |
| | 01.1-intro-annotated.pdf | 307.34 KB |
| | 2 - 5 - PRG Security Definitions (25 min).mp4 | 26.8 MB |
| | 2 - 3 - Attacks on stream ciphers and the one time pad (24 min).mp4 | 25.43 MB |
| | 2 - 4 - Real-world stream ciphers (20 min).mp4 | 21.87 MB |
| | 2 - 2 - Stream ciphers and pseudo random generators (20 min).mp4 | 21.17 MB |
| | 2 - 1 - Information theoretic security and the one time pad (19 min).mp4 | 20.04 MB |
| | 2 - 6 - Semantic Security (16 min).mp4 | 16.8 MB |
| | 2 - 7 - Stream ciphers are semantically secure (11 min).mp4 | 11.73 MB |
| | 02.3-stream-annotated.pdf | 593.05 KB |
| | 02.4-stream-annotated.pdf | 452.05 KB |
| | 02.1-stream-annotated.pdf | 380.28 KB |
| | 3 - 2 - The Data Encryption Standard (22 min).mp4 | 24.5 MB |
| | 3 - 3 - Exhaustive search attacks (20 min).mp4 | 21.91 MB |
| | 3 - 1 - What are block ciphers- (17 min).mp4 | 18.67 MB |
| | 3 - 4 - More attacks on block ciphers (16 min).mp4 | 17.75 MB |
| | 3 - 5 - The AES block cipher (14 min).mp4 | 14.52 MB |
| | 3 - 6 - Block ciphers from PRGs(12 min).mp4 | 12.88 MB |
| | 03.2-block-annotated.pdf | 1.06 MB |
| | 03.5-block-annotated.pdf | 808.05 KB |
| | 03.3-block-annotated.pdf | 467.89 KB |
| | 03.6-block-annotated.pdf | 434.19 KB |
| | 4 - 3 - Security for many-time key (23 min).mp4 | 24.92 MB |
| | 4 - 4 - Modes of operation many time key (CBC) (16 min).mp4 | 17.96 MB |
| | 4 - 1 - Review PRPs and PRFs (12 min).mp4 | 12.72 MB |
| | 4 - 5 - Modes of operation many time key (CTR) (10 min).mp4 | 10.44 MB |
| | 4 - 2 - Modes of operation one time key (8 min).mp4 | 7.98 MB |
| | 04.2-using-block-annotated.pdf | 387.28 KB |
| | 04.3-using-block-annotated.pdf | 316.89 KB |
| | 04.4-using-block-annotated.pdf | 263.42 KB |
| | 04.1-using-block-annotated.pdf | 259.45 KB |
| | 04.5-using-block-annotated.pdf | 204.65 KB |
| | 5 - 3 - CBC-MAC and NMAC (20 min).mp4 | 22.34 MB |
| | 5 - 5 - PMAC and the Carter-Wegman MAC (16 min).mp4 | 17.06 MB |
| | 5 - 1 - Message Authentication Codes (16 min).mp4 | 16.55 MB |
| | 5 - 2 - MACs Based On PRFs (10 min).mp4 | 11.18 MB |
| | 5 - 4 - MAC padding (9 min).mp4 | 9.3 MB |
| | 05.3-integrity-cbc-mac-and-nmac.pdf | 348.08 KB |
| | 05.1-integrity-message-authentication-codes.pdf | 236.25 KB |
| | 05.5-integrity-a-parallel-mac.pdf | 223.58 KB |
| | 05.4-integrity-mac-padding.pdf | 199.94 KB |
| | 05.2-integrity-macs-based-on-PRFs.pdf | 194.29 KB |
| | 6 - 2 - Generic birthday attack (16 min).mp4 | 16.14 MB |
| | 6 - 3 - The Merkle-Damgard Paradigm (12 min).mp4 | 12.58 MB |
| | 6 - 1 - Introduction (11 min).mp4 | 11.92 MB |
| | 6 - 6 - Timing attacks on MAC verification (9 min).mp4 | 9.39 MB |
| | 6 - 4 - Constructing compression functions (8 min).mp4 | 8.78 MB |
| | 6 - 5 - HMAC (7 min).mp4 | 7.83 MB |
| | 06.6-collision-resistance-Timing-attacks-on-MAC-verification.pdf | 267.74 KB |
| | 06.3-collision-resistance-the-merkle-damgard-paradigm.pdf | 258.63 KB |
| | 06.2-collision-resistance-generic-birthday-attack.pdf | 245.86 KB |
| | 06.4-collision-resistance-constructing-compression-functions.pdf | 232.22 KB |
| | 7 - 4 - Constructions from ciphers and MACs (21 min).mp4 | 22.84 MB |
| | 7 - 5 - Case study TLS (18 min).mp4 | 18.96 MB |
| | 7 - 6 - CBC padding attacks (14 min).mp4 | 14.99 MB |
| | 7 - 1 - Active attacks on CPA-secure encryption (13 min).mp4 | 14.02 MB |
| | 7 - 3 - Chosen ciphertext attacks (12 min).mp4 | 13.04 MB |
| | 7 - 7 - Attacking non-atomic decryption (10 min).mp4 | 11.09 MB |
| | 7 - 2 - Definitions (6 min).mp4 | 5.61 MB |
| | 07.1-authenc-annotated.pdf | 873.34 KB |
| | 07.6-authenc-annotated.pdf | 715.66 KB |
| | 07.4-authenc-annotated.pdf | 685.97 KB |
| | 8 - 3 - Deterministic EncryptionSIV and wide PRP (21 min).mp4 | 22.06 MB |
| | 8 - 2 - Deterministic Encryption (15 min).mp4 | 15.62 MB |
| | 8 - 4 - Tweakable encryption (15 min).mp4 | 15.58 MB |
| | 8 - 1 - Key Derivation (14 min).mp4 | 14.57 MB |
| | 8 - 5 - Format preserving encryption (13 min).mp4 | 13.21 MB |
| | 08.4-odds-and-ends.pdf | 550.71 KB |
| | 08.3-odds-and-ends.pdf | 515.4 KB |
| | 08.2-odds-and-ends.pdf | 449.21 KB |
| | 08.5-odds-and-ends.pdf | 375.59 KB |
| | 08.1-odds-and-ends.pdf | 328.66 KB |
| | 9 - 3 - The Diffie-Hellman protocol (19 min).mp4 | 20.96 MB |
| | 9 - 2 - Merkle Puzzles (11 min).mp4 | 12.4 MB |
| | 9 - 1 - Trusted 3rd parties (11 min).mp4 | 12.22 MB |
| | 9 - 4 - Public-key encryption (11 min).mp4 | 11.83 MB |
| | 09.3-basic-key-exchange-annotated.pdf | 434.87 KB |
| | 09.4-basic-key-exchange-annotated.pdf | 268.92 KB |
| | 09.2-basic-key-exchange-annotated.pdf | 229.86 KB |
| | 09.1-basic-key-exchange-annotated.pdf | 223.1 KB |
| | 10 - 5 - Intractable problems (19 min).mp4 | 21.22 MB |
| | 10 - 2 - Fermat and Euler (18 min).mp4 | 20.06 MB |
| | 10 - 3 - Modular e'th roots (17 min).mp4 | 19.09 MB |
| | 10 - 1 - Notation (15 min).mp4 | 15.7 MB |
| | 10 - 4 - Arithmetic algorithms (13 min).mp4 | 13.89 MB |
| | 10.3-numth-annotated.pdf | 287.45 KB |
| | 10.4-numth-annotated.pdf | 269.58 KB |
| | 10.1-numth-annotated.pdf | 241.83 KB |
| | 10.5-numth-annotated.pdf | 236.15 KB |
| | 10.2-numth-annotated.pdf | 187.29 KB |
| | 11 - 4 - PKCS 1 (23 min).mp4 | 23.4 MB |
| | 11 - 3 - The RSA trapdoor permutation (18 min).mp4 | 19.82 MB |
| | 11 - 5 - Is RSA a one-way function (17 min).mp4 | 18.53 MB |
| | 11 - 1 - Definitions and security (16 min).mp4 | 17.22 MB |
| | 11 - 6 - RSA in practice (14 min).mp4 | 15.63 MB |
| | 11 - 2 - Constructions (11 min).mp4 | 11.29 MB |
| | 11.1-pubkey-trapdoor.pdf | 549.58 KB |
| | 11.4-pubkey-trapdoor.pdf | 264.4 KB |
| | 11.3-pubkey-trapdoor.pdf | 239.02 KB |
| | 11.2-pubkey-trapdoor.pdf | 211.62 KB |
| | 12 - 1 - The ElGamal Public-key System (23 min).mp4 | 21.36 MB |
| | 12 - 2 - ElGamal Security (14 min).mp4 | 14.53 MB |
| | 12 - 4 - A Unifying Theme (12 min).mp4 | 12.93 MB |
| | 12 - 3 - ElGamal Variants With Better Security (11 min).mp4 | 11.27 MB |
| | 12 - 5 - Farewell (for now) (6 min).mp4 | 5.73 MB |
| | 12.1-pubkey-dh.pdf | 536.15 KB |
| | 12.5-pubkey-dh.pdf | 320.82 KB |
| | 12.2-pubkey-dh.pdf | 294.64 KB |
| | 12.4-pubkey-dh.pdf | 196.6 KB |
| | 12.3-pubkey-dh.pdf | 179.3 KB |