CS 668A Foundations of Cryptography

CS/CpE 668A Foundations of Cryptography

Prof. Rebecca Wright
Pierce 120
Thursdays 6:15-8:45pm
Fall 2003

[Note: This class was previously called CyberSecurity Techniques and Mechanisms, and has also been listed by CpE as Computer & Telecomm Security. Foundations of Cryptography is a more accurate name than either of these.]

Course description

This course provides a broad introduction to cornerstones of security (authenticity, confidentiality, message integrity, and non-repudiation) and the mechanisms to achieve them, as well as the underlying mathematical basics. Topics include: block and stream ciphers, public-key systems, key management, certificates, public-key infrastructure (PKI), digital signatures, non-repudiation, and message authentication. Various security standards and protocols such as DES, AES, PGP, and Kerberos, are studied.

Prerequisites: MA 502 (Mathematical Foundations of Computer Science) and CS 590 (Introduction to Data Structures and Algorithms), or permission of the instructor.

Textbooks

Douglas Stinson, Cryptography: Theory and Practice , second edition, CRC Press. (Required). A list of errata is also available on-line.

Alfred Menezes, Paul van Oorschot, and Scott Vanstone, Handbook of Applied Cryptography , CRC Press. (Optional). I think you will find this a useful supplement to the main text. It is accessible on the web, at http://www.cacr.math.uwaterloo.ca/hac/ .

You can also find useful background on computational aspects of number theory and algebra on-line, in A Computational Introduction to Number Theory and Algebra by Victor Shoup.

Syllabus

The syllabus for this course: ps | pdf .

Teaching Assisant

Georgi Babayan, gbabaya1(at)stevens-tech.edu .

Office Hours

Georgi Babayan's office hours are Tuesdays, 4-6pm, and Thursdays, 4:30-6pm, in the Burchard computing lab.
Prof. Wright's office hours are Tuesdays 2-4pm in Lieb 216.


Last updated 10/2/03 by
rwright (at) cs.stevens-tech.edu
Copyright © 2003 Rebecca N. Wright