here are the sections from Stinson's book as I roughly plan to cover them in class. Topics starting with *** ARE NOT IN THE BOOK. 1.Classical Cryptography Introduction: Some Simple Cryptosystems The Shift Cipher The Substitution Cipher Stream Ciphers *** Enigma 3.The Data Encryption Standard Introduction Description of DES An Example of DES Encryption DES Modes of Operation Differential Cryptanalysis *** Advanced Encryption Standard (AES) 2.Shannon's Theory Perfect Secrecy Entropy Huffman Encodings and Entropy Properties of Entropy Spurious Keys and Unicity Distance 11.Secret Sharing Schemes Introduction: The Shamir Threshold Scheme 8.Key Distribution and Key Agreement Introduction Diffie-Hellman Key Exchange The Station-to-station Protocol 4.The RSA System and Factoring Introduction to Public-key Cryptography More Number Theory The Euclidean Algorithm The Chinese Remainder Theorem Other Useful Facts The RSA Cryptosystem Implementing RSA Probabilistic Primality Testing Attacks On RSA The Decryption Exponent Partial Information Concerning Plaintext Bits The Rabin Cryptosystem Factoring Algorithms 5.Other Public-key Cryptosystems The ElGamal Cryptosystem and Discrete Logs Algorithms for the Discrete Log Problem Bit Security of Discrete Logs Finite Field and Elliptic Curve Systems Galois Fields Elliptic Curves 12.Pseudo-random Number Generation Introduction and Examples Indistinguishable Probability Distributions Next Bit Predictors The Blum-Blum-Shub Generator Probabilistic Encryption *** Pseudo-random functions *** Identification procotol 10.Authentication Codes Introduction Computing Deception Probabilities *** Universal Hashing Functions *** Perfect or nearly perfect MACs 6.Signature Schemes Introduction The ElGamal Signature Scheme The Digital Signature Standard One-time Signatures 7.Hash Functions Signatures and Hash Functions Collision-free Hash Functions The Birthday Attack A Discrete Log Hash Function Extending Hash Functions Hash Functions From Cryptosystems The MD4 Hash Function Timestamping 9.Identification Schemes Introduction The Schnorr Identification Scheme Converting Identification to Signature Schemes 13.Zero-knowledge Proofs Interactive Proof Systems Perfect Zero-knowledge Proofs Bit Commitments Computational Zero-knowledge Proofs Zero-knowledge Arguments *** Quantum Cryptography *** Qauntum Key Distribution