CSC 333 - 3 S.H.
Privacy, Security & Cryptology
This is a General Education/Intellectual Issues course, falling under the general heading of Explorations in the Natural Sciences. Students will learn about modern technological advances that are believed to enable private/secure communications and data storage and examine some vexing issues engendered by these advances. For example, tensions between privacy rights and effective law enforcement, and between open research and governmental secrecy will be examined. Other technological threats to privacy and security and our emerging information infrastructure (e.g., "weapons of mass disruption") will also be covered. Economic, political and philosophical aspects of privacy and security will be discussed.
Please note that credit for this course cannot be applied towards Computer Science major requirements.
Students should have satisfied all General Education/Knowledge Foundations requirements.
Even students not otherwise interested in science and technology should know the pitfalls of living in a networked world where governments and private concerns have greatly increased their ability to collect and integrate personal information from widely disparate sources. Privacy is on the line and students should learn how to deal with this threat intelligently.
"Strong cryptography" is now the principal means by which privacy and security can be guaranteed. Armies, banks, online shoppers, drug dealers and terrorists alike rely upon this technology to secure their communications and data from prying.. However, it is only a matter of conjecture that the most commonly used public-key cryptosystem is secure. Does everyone have access to the best available technology? Who deserves privacy? When can it be taken away? All these issues will be addressed, if not ultimately resolved.
COURSE OBJECTIVES
Upon successful completion of this course, students will be able to:
COURSE OUTLINE
METHODS OF INSTRUCTION
COURSE REQUIREMENTS
MEANS OF EVALUATION
RSA Laboratories. Frequently Asked Questions About Today's Cryptography, http://www.rsasecurity.com/rsalabs/faq
PBS/NOVA. Secrets, Lies and Atomic Spies (film)
Selected Court Case Summaries (e.g., Griswold vs. Connecticut)
E. Alderman & C. Kennedy. The Right to Privacy, Diane, 1995
P. Aries & G. Duby, gen. eds., A History of Private Life (5 volumes), Belknap/Harvard, 1987-
J. Bamford. Body of Secrets: Anatomy of the Ultra-Secret National Security Agency from the Cold War Through the Dawn of a New Century, Anchor, 2002.
W. Diffie & S. Landau. Privacy on the Line, MIT Press, 1998
S. Levy. Crypto, Penguin, 2002.
R. Lewand. Cryptological Mathematics, MAA, 2000.
H. Mel & D. Baker. Cryptography Decrypted, Addison-Wesley, 2001.
B. Schneier & D. Banisar. The Electronic Privacy Papers: Documents on the Battle for Privacy in the Age of Surveillance, Wiley, 1997
B. Schneier. Secrets and Lies: Digital Security in a Networked World, Wiley, 2000
S. Singh. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Anchor, 2000.
P. Zimmermann. Official PGP User's Guide, MIT Press, 1995.
Computer Science Curriculum Committee Chair Date
Computer Science Department Chair Date
Undergraduate Curriculum Committee Chair Date