CRYPTOGRAPHY AND ITS APPLICATIONS IN DIGITAL SECURITY
LECTURER Dr. Daniel Coore
COURSE CODE COMP6730 ( CS61R )


Reading Assignments


Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996.
Overview of Cryptography (Chap1)
Mathematical Background (Chap 2)
Number-Theoretic Reference Problems (Chap 3)
Block Cyphers (Chap 7)
Public-Key Encryption (Chap 8)
Digital Signatures (Chap 11)
Efficient Implementation (Chap 14)
Index


Projects

Project 1
Due Tues, Nov 30 , 2004
Downloads


Exams

Resource
Download
Sample Exam
Practice Problems

OBJECTIVES

At the end of this course, students should be able to

  • demonstrate an understanding of the wide variety of problems that can be solved by cryptographic techniques
  • demonstrate an understanding of the vulnerability of data in a network environment
  • demonstrate the knowledge of a wide variety of cryptographic algorithms and protocols
  • Demonstrate an ability to analyse some of the cryptographic algorithms. Using mathematical techniques where necessary
  • Demonstrate the ability to alloy the knowledge acquired to real systems, using examples from electronic commerce systems, the internet, distributed file systems, etc...
SYLLABUS

Cryptography

  • Mathematical Background
  • Cryptographic algorithms
    • symmetric algorithms
    • public key algorithms
  • Cryptographic protocols
    • key exchange
    • authentication & electronic signatures
    • key escrow
    • secret sharin
    • other protocols

Computer and other communications security

  • Password systems
    • compromising of password
    • encrypted passwords
  • Encrypted file systems
  • Key management

Security and privacy issued on the internet

ASSESSMENT PROCEDURES
  • Examination: 3 hours, 60%
  • Coursework: 40%
REQUIRED TEXTS as deemed appropriate by the lecturer.