IMC: Schedule

LectureCommencingKey TopicsLecturesReferences
113/01/2026
  • Lecture 1
  • Introduction and shift chiper
See the end of the slides
216/01/2026
  • Lecture 2
  • Historical ciphers
  • Secure encryption
  • Perfect secrecy
See the end of the slides
3 
  • Lecture 3
  • Perfect secrecy (cont.)
  • One time pad
See the end of the slides
4 
  • Lecture 4
  • One time pad (cont.)
  • Perfect/computational indistinguishability
See the end of the slides
5 
  • Lecture 5
  • Computational Indistinguishability (cont.)
  • Pseudorandomness and PRGs
See the end of the slides
6 
  • Lecture 6
  • Pseudo one-time-pad
See the end of the slides
7 
  • Lecture 7
  • CPA security
  • PRFs and PRPs
See the end of the slides
8 
  • Lecture 8
  • CPA secure encryption
See the end of the slides
9 
  • Lecture 9
  • Block ciphers
  • CCA security
See the end of the slides
10 
  • Lecture 10
  • Message integrity
  • MAC 
See the end of the slides
11 
  • Lecture 11
  • Security reduction recap 
message-authentication-code.pdfSee the end of the slides
12 
  • Lecture 12
  • Message authentication (cont.)
  • Hash functions
See the end of the slides
13 
  • Lecture 13
  • Authenticated encryption
See the end of the slides
14 
  • Lecture 14
  • Group assumptions
  • Diffie-Hellman key exchange
See the end of the slides
15 
  • Lecture 15
  • Public-key encryption
  • RO and Digital Signatures (until the description of the signature scheme) 
See the end of the slides
16 
  • Lecture 16
  • Digital Signatures: (Security proof) 
See the end of the slides
17 
  • Lecture 17
  • Digital Signatures (Security proof)
See the end of the slides
18 
  • Zero-Knowledge
See the end of the slides
19 
  • Extra tutorial from the Lecturer. We will discuss the solutions of the past year exam
The exam for 2024/2025 will have a a different structure but the type of questions will be similar. More information will be provided during the lectures

License
All rights reserved The University of Edinburgh