ITIS6240 Applied Cryptography

Course Description

3 Credit hours. Cross-listed as HCIP 6240. Prerequisite: Full graduate standing or permission of department. Provides students with an understanding of modern cryptographic techniques, algorithms and protocols that are of fundamental importance to the design and implementation of security critical applications. Covers not only standard cryptographic techniques, but also exposes students to the latest advances in applied cryptography. Topics include: secret and public key ciphers, stream ciphers, one-way hashing algorithms, authentication and identification, digital signatures, key establishment and management, secret sharing and data recovery, public key infrastructures, and efficient implementation.

Grading Policy

Midterm exam: 25% Final exam: 25% Projects and assignments: 30% Research presentation: 20%

Text Book

Handbook of Applied Cryptography, CRC Press.

Topics (by week)

  1. Classical Cryptography
  2. Block Ciphers
  3. Hash functions
  4. Public key cryptography
  5. PKCS standards
  6. Identity Based Cryptography
  7. Student Research Presentation 1
  8. mid-term exam and reviews (summary)
  9. Elliptic Curve Cryptography
  10. Secure Password Authentication Protocols
  11. Cryptography in real life
  12. Quantum key agreement and Shor’s quantum attack algorithm on RSA
  13. Recent news and results in Cryptography (varies each term due to the progress in recent research results)
  14. Student Research Presentation 2

Academic Integrity

All students are required to read and abide by the Code of Student Academic Integrity. Violations of the Code of Student Academic Integrity, including plagiarism, will result in disciplinary action as provided in the Code.Definitions and examples of plagiarism are set forth in the Code. The Code is available from the Dean of Students Office or online.