CS/ECE 578 Cryptography and Data Security, Fall 2017

                                                                    

Instructor: Dr. Köksal Muş,  kmus@wpi.edu, AK-212B

TA: Gizem Çetin, gscetin@wpi.edu, AK-212A

 

Time & Place : AK-233, Monday, 6pm-8:50pm.

 

Office Hour: Tuesday between 3pm and 4pm. For those who are not avaible on office hours may send an e-mail for an appointment.

 

Course Web Page

The latest announcements, handouts, assignments, source code, useful and interesting web links etc can be found on WPI Canvas course page .

 

Textbook

Cryptography: An Introduction (Paperback), by Nigel Smart, Mcgraw-Hill College, The text was made available by the author for free download at:

http://www.cs.bris.ac.uk/_nigel/Crypto Book/

 

Additional References

·         Introduction to Cryptography with Coding Theory, byWade Trappe Lawrence, C. Washington Prentice Hall; 2nd edition (July 15, 2005).

·         Understanding Cryptography: A Textbook for Students and Practitioners, Christof Paar, Jan Pelz, Springer; 1st Edition, July 8, 2010.

·         Cryptography : Theory and Practice. D. Stinson. 2nd Edition, CRC Press.

·         Network Security: Private Communication in a Public World, 2nd Edition, C. Kaufman, R. Perlman, and M. Speciner. Prentice-Hall.

 

Recommended Background

Interest in the subject matter and good standing in CS courses should suffice. Exposure to discrete mathematics will also help.

 

Assignments

There will be assignments (in total of 5 or 6) composed of made-up questions, exercises and review questions.

 

Examinations

There will be a single in-class examination. You will be allowed to bring a single page, hand written cheat sheet (photocopies and print-outs are not allowed).

 

Final Presentation

Towards the end of the semester the students will be required to pick a subject area relevant to the lecture material in consultation with the instructor. Each student will give a brief/in-class presentation and a report during the last three weeks of the semester.

 

Grading

The following weight distribution will be used to calculate the fınal grade:

·        40% Assignments

·        40% Exam

·        20% Presentation

 

Tentative Course Outline

 

Symmetric Cryptography

1.     Principles of Cryptography, historical ciphers and their cryptanalysis

2.     Randomness, Stream Ciphers and One-time Pad

3.     Block Ciphers: AES, basics, functionality and security

4.     Block Ciphers: Modes of operation

5.     Hash functions and MACs

 

Asymmetric Cryptography

1.     Mathematical Foundations and Diffie-Hellman Key Exchange

2.     Asymmetric Encryption: ElGamal and RSA

3.     Digital Signatures

4.     Elliptic Curve Cryptography

 

Applications of Cryptography

Selected topics