CS/ECE 578 Cryptography and Data Security, Fall 2017
Instructor: Dr. Köksal Muş, kmus@wpi.edu, AK-212B
TA: Gizem Çetin, gscetin@wpi.edu, AK-212A
Time & Place : AK-233, Monday, 6pm-8:50pm.
Office Hour: Tuesday between 3pm and 4pm. For those who are not avaible on office hours may send an e-mail for an appointment.
Course Web Page
The latest announcements, handouts, assignments, source code, useful and interesting web links etc can be found on WPI Canvas course page .
Textbook
Cryptography: An Introduction (Paperback), by Nigel Smart, Mcgraw-Hill College, The text was made available by the author for free download at:
http://www.cs.bris.ac.uk/_nigel/Crypto Book/
Additional References
· Introduction to Cryptography with Coding Theory, byWade Trappe Lawrence, C. Washington Prentice Hall; 2nd edition (July 15, 2005).
· Understanding Cryptography: A Textbook for Students and Practitioners, Christof Paar, Jan Pelz, Springer; 1st Edition, July 8, 2010.
· Cryptography : Theory and Practice. D. Stinson. 2nd Edition, CRC Press.
· Network Security: Private Communication in a Public World, 2nd Edition, C. Kaufman, R. Perlman, and M. Speciner. Prentice-Hall.
Recommended Background
Interest in the subject matter and good standing in
CS courses should suffice. Exposure to discrete mathematics will also help.
Assignments
There will be assignments (in total of 5 or 6) composed of made-up questions, exercises and review questions.
Examinations
There will be a single in-class examination. You will be allowed to bring a single page, hand written cheat sheet (photocopies and print-outs are not allowed).
Final Presentation
Towards the end of the semester the students will be
required to pick a subject area relevant to the lecture material in consultation
with the instructor. Each student will give a brief/in-class presentation and a
report during the last three weeks of the semester.
Grading
The following weight distribution will be used to calculate
the fınal grade:
·
40% Assignments
·
40% Exam
· 20% Presentation
Tentative Course Outline
Symmetric Cryptography
1. Principles of Cryptography,
historical ciphers and their cryptanalysis
2. Randomness, Stream Ciphers
and One-time Pad
3. Block Ciphers: AES, basics,
functionality and security
4. Block Ciphers: Modes
of operation
5. Hash functions and MACs
Asymmetric Cryptography
1. Mathematical Foundations
and Diffie-Hellman Key Exchange
2. Asymmetric Encryption:
ElGamal and RSA
3. Digital Signatures
4. Elliptic Curve Cryptography
Applications of Cryptography
Selected topics