This course will discuss a broad range of computer security issues related to cryptography and networks. Students will study the design and use of cryptographic systems and analyze cryptanalytic attacks. A history of cryptographic systems and the mathematics behind them will be covered as well. Techniques of network security, including cryptographic techniques, will be covered.Note: Graduate standing in the MSCS program or permission of the instructor. Students are responsible to both be aware of and abide by prerequisites for ICS courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites.First day attendance is mandatory.
4 Graduate credits
Effective May 10, 2004 to present
- Perform computations using key theorems of the mathematical underpinnings of contemporary cryptography, and prove related results.
- Use the principles of substitution and transposition to perform encryptions and decryptions of historical pencil-and-paper ciphers.
- Analyze the workings of modern cryptographic algorithms (both symmetric and public-key) manipulate simplified versions of modern algorithms, analyze the factors that determine the security of cryptographic algorithms, and evaluate security properties of such algorithms.
- Explain the purpose and theory of cryptographic hash functions, do computations with simplified hash functions, analyze security properties of hash functions, and describe modern attacks against hash functions.
- Analyze various forms of digital signature algorithm, explain security properties of digital signatures, and work with simplified digital signature algorithms.
- Demonstrate expertise in reading peer-reviewed papers in computer security, and explain them in writing.