State University of New York at Oswego



  1. COURSE NUMBER AND CREDIT
  2. CSC 432 - 3 Semester Hours

  3. COURSE TITLE
  4. Cryptology

  5. COURSE DESCRIPTION
  6. Introduction to the theory and practice of cryptography and cryptanalysis. Theoretical underpinnings of modern cryptosystems will be examined and unproven assumptions exposed. Both symmetric- and public-key cryptosystems will be covered. Applications of cryptography to identification, authentication and non-repudiation protocols. Zero-knowledge protocols and oblivious transfer. Cryptanalytical attacks.Economic, political and ethical issues raised by strong cryptography will be discussed.

  7. PREREQUISITES
  8. CSC 241 and MAT 215

  9. COURSE JUSTIFICATION
  10. Strong cryptography is now available to any group or individual that wants it. Banks, online shoppers, drug dealers and terrorists alike rely upon this technology to secure their communications and data from prying. Yet is it possible that the most popular public-key cryptosystem is without foundation.

    Students will learn the strengths and (potential) weaknesses of various encryption schemes. As they grow more comfortable with the underlying theory, they should become fairly sophisticated users of cryptosystems, able to negotiate trade-offs (e.g., between key length and efficiency) to suit particular applications.

    Moreover, computer science students should know the pitfalls of living in a networked world where governments and marketers have greatly increased their ability to collect and integrate personal information from widely disparate sources.

  11. COURSE OBJECTIVES
    1. To develop the necessary mathematical background to understand cryptological algorithms and theorems.
    2. To learn the most important cryptological systems, and the applications for which each is best suited.
    3. To implement some of these algorithms, learning how to work with infinite precision integer arithmetic in the process.
    4. To develop an appreciation of the economic, political and ethical impact of strong cryptology.

  12. COURSE OUTLINE
    1. Introduction
      1. uses of cryptology
      2. users of cryptology
    2. Mathematics Review
      1. Functions
        1. basics
        2. computational complexity
        3. one-way functions
      2. Elementary Number Theory
        1. modular arithmetic
        2. primality
        3. factoring
      3. Elementary Discrete Probability Theory
    3. Defining Security: Shannon's Theory
    4. Symmetric Key Cryptosystems
      1. Data Encryption Standard (DES)
      2. Others
    5. Public Key Cryptosystems
      1. RSA
      2. Others
    6. Identification, Authentication and Non-Repudiation Protocols
    7. Key Distribution / Public Key Infrastructure
    8. Zero-Knowledge Protocols and Oblivious Transfer
    9. Economic / Political / Ethical Considerations
      1. privacy rights vs. law enforcement needs
      2. governmental secrecy vs. open research
      3. software as ordnance
      4. who deserves privacy?
    10. Quantum Cryptography

  13. METHODS OF INSTRUCTION
    1. Lectures
    2. Discussions

  14. COURSE REQUIREMENTS
    1. Attendance at lectures
    2. Readings from theory and systems texts
    3. Homework assignments
    4. Final Project

  15. MEANS OF EVALUATION
    1. Quizzes
    2. Individual pencil-and-paper assignments
    3. Group/Individual programming assignments
    4. Project

  16. RESOURCES
  17. No additional resources are necessary.

  18. BIBLIOGRAPHY
  19. MAIN TEXTS

    WEB

    RSA Laboratories. Frequently Asked Questions About Today's Cryptography, http://www.rsasecurity.com/rsalabs/faq

    F.L. Bauer. Decrypted Secrets: Methods and Maxims of Cryptology, 3rd ed.,  Springer Verlag, 2002.

    J.A. Buchmann. Introduction to Cryptography, Springer Verlag, 2001.

    N. Koblitz. A Course in Number Theory and Cryptography, 2nd ed., Springer Verlag, 1994.

    R. Lewand. Cryptological Mathematics, MAA, 2000.

    B. Schneier. Applied Cryptography, Wiley, 1996.

    D. Stinson.  Cryptography: Theory and Practice, 2nd ed,  CRC Press, 2002.

    W. Trappe and L. Washington. Introduction to Cryptography with Coding Theory, Prentice Hall, 2002.

    SUPPLEMENTAL BOOKS

    J. Bamford. Body of Secrets: Anatomy of the Ultra-Secret National Security Agency from the Cold War Through the Dawn of a New Century, Anchor, 2002.

    S. Levy. Crypto, Penguin, 2002.

    H. Mel and D. Baker. Cryptography Decrypted, Addison-Wesley, 2001.

    S. Singh. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Anchor, 2000.

  20. SIGNATURES
  21.                                                                         
            Computer Science Curriculum Committee Chair           Date
    
                                                                            
                Computer Science Department Chair                 Date
    
                                                                            
             Undergraduate Curriculum Committee Chair             Date
        

Document:
URL:
Last Update: