Private communications (DES, AES, ECB, CBC, RSA, Rabin), identification and authentication techniques (passwords, certificates, SSH, Kerberos), secure protocols (digital cash, Internet auction, electronic voting).
As a crucial part of computer security, cryptography has become increasingly important. However, due to the mathematically complex nature of cryptography, misunderstandings, misuses, and abuses of cryptographic techniques are very common. There is a huge gap between the theory of cryptography and its application. In this course, we study cryptography in a rigorous manner. Our focus is correct application of cryptographic techniques in practical scenarios, rather than the mathematical foundations of these techniques. We stress careful design and analysis of secure systems using existing building blocks. Topics to be covered include private communications (DES, AES, ECB, CBC, RSA, Rabin), identification and authentication techniques (passwords, certificates, SSH, Kerberos), secure protocols (digital cash, Internet auction, electronic voting).
Ph.D.:
This course does not fulfill core area or core course requirements.
M.S.:
This course fulfills one Software and Information Systems Core Area requirement.
None presently required.
| Semester | Section | Title | Instructor | Credit Hours | Enrolled |
|---|---|---|---|---|---|
| Fall 2013 | LEC | App Crypto & Comp Sci | Staff | 3 | 0/ 0 |
| Spring 2012 | LEC | App Crypto & Comp Sci | Dr. Sheng Zhong | 3 | 43/40 |
| Fall 2010 | LEC | App Crypto & Comp Sci | Dr. Sheng Zhong | 3 | 27/35 |
| Fall 2009 | LEC | App Crypto & Comp Sci | Dr. Sheng Zhong | 3 | 28/30 |
| Spring 2009 | LEC | App Crypto & Comp Sci | Dr. Sheng Zhong | 3 | 29/30 |
| Spring 2008 | LEC | App Crypto & Comp Sci | Dr. Sheng Zhong | 3 | 8/20 |
| Spring 2007 | LEC | App Crypto & Comp Sci | Dr. Sheng Zhong | 3 | 7/20 |