EFTA02341343.pdf
Extracted Text (OCR)
From:
Introduction to Cryptography Course Team <noreply@coursera.org>
Sent:
Monday, February 18, 2013 8:25 AM
To:
jeeproject@yahoo.com
Subject:
Online Cryptography class: week 6
Dear Jeffrey epstein,
The week 6 lectures and problem set are now posted on the course web site at
https://crypto.stanford.edu/OnlineCrypto
The problem set is due in three weeks. There is also an extra credit programming project that will enhance your
understanding of RSA.
This week's topic is public key encryption: how to encrypt using a public key and decrypt using a secret key. Public key
encryption is used for session setup in HTTPS, for key management in encrypted file systems, and for many other tasks.
We will see how to use public-key encryption in the video segments.
The videos cover two families of public key encryption systems. One based on trapdoor functions (RSA in particular) and
the other based on the Diffie-Hellman protocol. We consider both basic semantic security and security against
tampering also known as chosen ciphertext security (CCA security). There has been a ton of research on CCA security
over the past decade and given the allotted time we can only summarize the main results from the last few years. The
lectures contain suggestions for further readings for those interested in learning more about CCA secure public-key
systems. The problem set this week involves a bit more math than usual, but should expand your understanding of
public-key encryption. Please don't be shy about posting questions in the forum.
This is the last week of this Crypto I course. I hope everyone learned a lot and enjoyed the material. Crypto is a beautiful
topic with lots of open problems and room for further research. I look forward to seeing you in Crypto II where we will
cover additional core topics and a few more advanced topics.
The final exam will be made available next week and students will have three weeks to complete the exam. We will send
statements of accomplishment once the exam window ends.
Enjoy,
Dan
Introduction to Cryptography Course Team You are receiving this email because jeeproject@yahoo.com is enrolled in
Introduction to Cryptography <https://class.coursera.org/crypto-005/class/index> . To stop receiving similar future
emails from this class, please click here <https://class.coursera.org/crypto-
005/auth/stopemails?data=a4Ek5x34TUWz2S748pdv501O48mjoyzEVx1rbHISrSES0tMOdgoISA6iYo91Dzc7f9XuGVLwdw
%ThhiqgVP%2FrdDA%3D%3D%7CMialw8maG89RPFObNVK2RCU%2BYx%28(19lit6yrzFNZHqlh2Ety2%2FexQZeIr0xQiIzqv
AsEWi%28aEOA2YOYDWAOxoCHWAV7wUsHNXInbcP0ReS2TsWoDY%2FoplxnAkoN9Y5HP0eFhPWUBEWSLII10C%2BkeH
7AdSXshICtwotE4ekcileMjyok7sm7Zxdhamn951DpsdM8> . Please do not reply directly to this email. If you have any
questions or feedback, please post on the class discussion forums <https://class.coursera.org/crypto-005/forum/index> .
For general questions, please visit our support site chttp://help.coursera.orgh .
date-last-viewed 0.0 date-received 1361175940 flags 8623750145 original-mailbox
imap://jeevacation@imap.gmail.com/%58Gmail%5D/All%20Mail remote-id 276904
EFTA_R1_01306798
EFTA02341343
Document Preview
Extracted Information
People Mentioned
Email Addresses
Phone Numbers
Document Details
| Filename | EFTA02341343.pdf |
| File Size | 147.6 KB |
| OCR Confidence | 85.0% |
| Has Readable Text | Yes |
| Text Length | 3,155 characters |
| Indexed | 2026-02-12T15:03:21.240629 |
Related Documents
Documents connected by shared names, same document type, or nearby in the archive.