Double coded of CS 507, Classical Cryptosystems, Basic Number Theory, Block Cipher Algorithms: DES, 3DES, and AES(Rijndael), Public Key Cryptography: RSA Discrete Logarithms, Elliptic Curve Cryptography(ECC), Digital Signatures, Implementation Issues, Secret Sharing, Zero Knowledge Techniques, Games, Digital Cash, Quantum Cryptography.
Cryptography (CS 411)
Programs\Type | Required | Core Elective | Area Elective |
BA- Political Science | |||
BA-Cultural Studies | |||
BA-Cultural Studies | |||
BA-Economics | |||
BA-Economics | |||
BA-International Studies | |||
BA-International Studies | |||
BA-Management | |||
BA-Management | |||
BA-Political Sci.&Inter.Relat. | |||
BA-Political Sci.&Inter.Relat. | |||
BA-Social & Political Sciences | |||
BA-Visual Arts&Visual Com.Des. | |||
BA-Visual Arts&Visual Com.Des. | |||
BS-Biological Sci.&Bioeng. | * | ||
BS-Computer Science & Eng. | * | ||
BS-Computer Science & Eng. | * | ||
BS-Electronics Engineering | * | ||
BS-Electronics Engineering | * | ||
BS-Industrial Engineering | |||
BS-Manufacturing Systems Eng. | |||
BS-Materials Sci. & Nano Eng. | * | ||
BS-Materials Science & Eng. | * | ||
BS-Mechatronics | * | ||
BS-Mechatronics | * | ||
BS-Microelectronics | |||
BS-Molecular Bio.Gen.&Bioeng | * | ||
BS-Telecommunications | * |
CONTENT
LEARNING OUTCOME
Show a good understanding of security issues in a classical communications scenario.
Explain why classical ciphers using mono-or poly alphabetic substitution technique are weak.
Demonstrate a good understanding of introductory number theory pertaining to prime numbers, divisibility, rings, groups, finite fields.
Use software libraries for number theory and cryptographic operations and build application using these libraries.
Outline the classic taxonomy of cryptographic algorithms, and give at least one contemporary example for each class in the taxonomy
Explain the difference between stream ciphers and block ciphers and the difference between symmetric ciphers and asymmetric ciphers, and areas of their usage.
Demonstrate a good understanding of block cipher design principles and one public key algorithm
Give at least two examples for hard problems on which contemporary cryptographic algorithms are based.
Calculate the minimum key length that should be used in one symmetric and one public key cryptosystem for at least two different security levels.
Demonstrate a good understanding of public key certificates and their usage in securing communication channels.
Design and implement a simple communication protocol that provides basic security functionality including confidentiality, integrity, authentication, non-repudiation for communicating parties.
Update Date:
ASSESSMENT METHODS and CRITERIA
Percentage (%) | |
Final | 35 |
Midterm | 30 |
Exam | 10 |
Group Project | 15 |
Homework | 10 |