Information Security

Spring 2025 | CS-3610

Logistics:

Instructor Subhashis Banerjee
Credits 2
Time Tuesdays, 11:50am to 1:20pm
Venue AC-01-LR-106
Teaching Fellow Abhay Kumar
Graduate Assistant Adityavir Singh
Teaching Assistants Bhumika Mittal, Karthik Sridhar, Pranit Sinha
Communication Google Classroom


Lecture Notes and Slides

Course Overview

This course provides a foundational understanding of information security, focusing on the principles of trust, verifiability, and adversarial threat models. It explores key concepts such as secrecy, privacy, and security, along with the basics of cryptography, including symmetric and public-key encryption, authentication, hash functions, digital signatures, certificates, cryptographic protocols, and applications. The course also introduces cryptographic security definitions to provide a rigorous framework for reasoning about security. Key topics include models of authentication and authorization, biometrics, identity systems, and the challenges associated with verifying hardware and software integrity; the frameworks of formal verification and model checking. The course also addresses trust assumptions and strategies for distributing trust through secure multiparty computations, hardware trust models, trusted computing environments, and remote attestation. The curriculum also covers elements of operating system and network security, offering a comprehensive perspective on addressing real-world security challenges with rigor and precision.

Prerequisites

Data Structures and Algorithms, Probability and Statistics

Grading

  • Quizzes: 20%
  • Assignments: 30%
  • Midterm: 25%
  • Final exam: 25%

The grading policy will be absolute, meaning your grade will be based on your performance against fixed criteria, not compared to other students. This ensures that anyone who demonstrates mastery of the material can achieve the top grades, regardless of how others perform. The cut-offs for each grade will be announced soon.

Attendance

The course requires 100% attendance, and attendance will be recorded in every class. There will be material covered in class that is not present in textbooks. In addition, some portion of the lectures will be used for discussions. It is in your best interests to attend the lectures as they happen, and get your questions answered during the discussions, rather than waiting till the end of the semester. Additionally, there will be no make-up provisions for missed quizzes or class participation for whatever reason.

Resources and Reading Materials

Text-books:

Tools, Software, and Languages:

We will also provide additional reading materials and resources as the course progresses.

Discussion Sessions

Please sign up for the discussion sessions on the AMS.

Academic Honor Code

From Ashoka’s Academic Integrity Policy (MyAshoka → Information and Documents → Office of Academic Affairs): plagiarism—which is a matter of producing academic work that borrows, without acknowledging, from another person’s work—is a serious academic offense. All violations of Academic Integrity Policy (including but not limited to plagiarism) will be reported to the Academic Integrity Committee and will result in an F grade for the entire course, no exceptions. Please familiarize yourself with the policies and sanctions.

Contacting Course Staff:

The recommended method for contacting course staff is through the email alias cs3610staff@ashoka.edu.in. Please start the subject of your email with “Information Security:”.

Support

Students are encouraged to reach out to University offices such as the Office of Learning Support, and Ashoka Center for Well-Being for additional support.