UB - University at Buffalo, The State University of New York Computer Science and Engineering

CSE 664: Applied Cryptography and Computer Security

This page refers to the Spring 2017 offering of CSE 664 only. The information on this page does not necessarily apply to every offering of CSE 664.

Spring 2017

20115

Marina Blanton

Private communications (DES, AES, ECB, CBC, RSA, Rabin), identification and authentication techniques (passwords, certificates, SSH, Kerberos), secure protocols (digital cash, Internet auction, electronic voting).

As a crucial part of computer security, cryptography has become increasingly important. However, due to the mathematically complex nature of cryptography, misunderstandings, misuses, and abuses of cryptographic techniques are very common. There is a huge gap between the theory of cryptography and its application. In this course, we study cryptography in a rigorous manner. Our focus is correct application of cryptographic techniques in practical scenarios, rather than the mathematical foundations of these techniques. We stress careful design and analysis of secure systems using existing building blocks. Topics to be covered include private communications (DES, AES, ECB, CBC, RSA, Rabin), identification and authentication techniques (passwords, certificates, SSH, Kerberos), secure protocols (digital cash, Internet auction, electronic voting).

None presently required.

Ph.D.: None.

M.S.: This course does not fulfill core area (depth) or core course (breadth) requirements.

CSE 664: Applied Cryptography and Computer Security

This page refers to the Spring 2017 offering of CSE 664 only. The information on this page does not necessarily apply to every offering of CSE 664.

Spring 2017

20115

Marina Blanton

Private communications (DES, AES, ECB, CBC, RSA, Rabin), identification and authentication techniques (passwords, certificates, SSH, Kerberos), secure protocols (digital cash, Internet auction, electronic voting).

As a crucial part of computer security, cryptography has become increasingly important. However, due to the mathematically complex nature of cryptography, misunderstandings, misuses, and abuses of cryptographic techniques are very common. There is a huge gap between the theory of cryptography and its application. In this course, we study cryptography in a rigorous manner. Our focus is correct application of cryptographic techniques in practical scenarios, rather than the mathematical foundations of these techniques. We stress careful design and analysis of secure systems using existing building blocks. Topics to be covered include private communications (DES, AES, ECB, CBC, RSA, Rabin), identification and authentication techniques (passwords, certificates, SSH, Kerberos), secure protocols (digital cash, Internet auction, electronic voting).

None presently required.

Ph.D.: None.

M.S.: This course does not fulfill core area (depth) or core course (breadth) requirements.

Valid XHTML 1.0 Transitional