Lecture Material

Readings

Videos

Notes

Hover over images to see the title; right-click and view the image to zoom in. Alternatively, download a zip archive with all the images or a printable PDF of the notes. You can also download a printable PDF of the notes from last year.

Assumptions of Encryption and MACs Modification Attack on MAC 1 Modification Attack on MAC 2 Masquerade Attack on MAC MAC Assumptions and Collisions