This lesson is still being designed and assembled (Pre-Alpha version)

DeapSECURE Lesson 5: Cryptography for Privacy-Preserving Computation


This lesson module introduces the homomorphic encryption technique, which is powerful to address concerns around data privacy, when private data has to be shared with other parties for computation purposes.

Here are our objectives for this module:

Prerequisites

  • Basic operation of UNIX shell
  • Basic Python programming skill
  • Basic operation of SLURM job scheduler

Website: https://deapsecure.gitlab.io/deapsecure-lesson05-crypt

Schedule

Setup Download files required for the lesson
00:00 1. HPC for Advanced Cryptography What are the main issues with security and trust in computing?
00:00 2. A Brief Introduction to Python What is Python?
How do I use Python to perform computation with numbers and text?
How do I handle a large amount of data using Python?
How do I write a tool in Python?
00:40 3. Data Encoding and Encryption Using Python Libraries How do we encode data on a digital computer?
How do we encrypt information using AES?
How do we serialize and deserialize data structures using JSON?
01:20 4. Breaking Modified AES-256 Encryption Hands-on 1: Cracking Modified AES-256 Encryption
01:20 5. Homomorphic Encryption --- A Primer What is homomorphic encryption (HE)?
What can be encrypted and processed using HE?
01:20 6. Paillier Cryptosystem for Homomorphic Encryption What is Paillier encryption scheme?
What can be encrypted and calculated using Paillier HE?
How to save encrypted numbers?
01:20 7. Privacy-Preserving Computation with Homomorphic Encryption Hands-on 2: How to use homomorphic encryption for privacy preserving computation?
01:20 8. Parallel Computation with Homomorphic Encryption Hands-on 3: How to use parallel computing to speed up HE computations?
01:20 9. Supplementary Info: Homomorphic Encryption Implementations What are some implementations of homomorphic encryption?
01:20 10. Outro: Applications of Homomorphic Encryption What are the important applications of homomorphic encryption?
01:20 Finish

The actual schedule may vary slightly depending on the topics and exercises chosen by the instructor.