ICS 682 Cryptography and Computer Security
Special information
Prerequisites: Graduate standing. Note: Students are responsible to both be aware of and abide by prerequisites for ICS courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites.
Effective May 10, 2004 to present
Learning outcomes
General
- Perform computations using key theorems of the mathematical underpinnings of contemporary cryptography, and prove related results.
- Use the principles of substitution and transposition to perform encryptions and decryptions of historical pencil-and-paper ciphers.
- Analyze the workings of modern cryptographic algorithms (both symmetric and public-key) manipulate simplified versions of modern algorithms, analyze the factors that determine the security of cryptographic algorithms, and evaluate security properties of such algorithms.
- Explain the purpose and theory of cryptographic hash functions, do computations with simplified hash functions, analyze security properties of hash functions, and describe modern attacks against hash functions.
- Analyze various forms of digital signature algorithm, explain security properties of digital signatures, and work with simplified digital signature algorithms.
- Demonstrate expertise in reading peer-reviewed papers in computer security, and explain them in writing.