This course will discuss a broad range of computer security issues related to cryptography and networks. Students will study the design and use of cryptographic systems and analyze cryptanalytic attacks. A history of cryptographic systems and the mathematics behind them will be covered as well. Techniques of network security, including cryptographic techniques, will be covered.
- Use the principles of substitution and transposition to perform encryptions and decryptions of historical pencil-and-paper ciphers.
- Perform computations using key theorems of the mathematical underpinnings of contemporary cryptography, and prove related results.
- Analyze the workings of modern cryptographic algorithms (both symmetric and public-key) manipulate simplified versions of modern algorithms, analyze the factors that determine the security of cryptographic algorithms, and evaluate security properties of such algorithms.
- Explain the purpose and theory of cryptographic hash functions, do computations with simplified hash functions, analyze security properties of hash functions, and describe modern attacks against hash functions.
- Analyze various forms of digital signature algorithm, explain security properties of digital signatures, and work with simplified digital signature algorithms.
- Demonstrate expertise in reading peer-reviewed papers in computer security, and explain them in writing.