CSC 432 - 3 Semester Hours
Cryptology
Introduction to the theory and practice of cryptography and cryptanalysis. Theoretical underpinnings of modern cryptosystems will be examined and unproven assumptions exposed. Both symmetric- and public-key cryptosystems will be covered. Applications of cryptography to identification, authentication and non-repudiation protocols. Zero-knowledge protocols and oblivious transfer. Cryptanalytical attacks.Economic, political and ethical issues raised by strong cryptography will be discussed.
CSC 241 and MAT 215
Strong cryptography is now available to any group or individual that wants it. Banks, online shoppers, drug dealers and terrorists alike rely upon this technology to secure their communications and data from prying. Yet is it possible that the most popular public-key cryptosystem is without foundation.
Students will learn the strengths and (potential) weaknesses of various encryption schemes. As they grow more comfortable with the underlying theory, they should become fairly sophisticated users of cryptosystems, able to negotiate trade-offs (e.g., between key length and efficiency) to suit particular applications.
Moreover, computer science students should know the pitfalls of living in a networked world where governments and marketers have greatly increased their ability to collect and integrate personal information from widely disparate sources.
No additional resources are necessary.
MAIN TEXTS
WEB
RSA Laboratories. Frequently Asked Questions About Today's Cryptography, http://www.rsasecurity.com/rsalabs/faq
F.L. Bauer. Decrypted Secrets: Methods and Maxims of Cryptology, 3rd ed., Springer Verlag, 2002.
J.A. Buchmann. Introduction to Cryptography, Springer Verlag, 2001.
N. Koblitz. A Course in Number Theory and Cryptography, 2nd ed., Springer Verlag, 1994.
R. Lewand. Cryptological Mathematics, MAA, 2000.
B. Schneier. Applied Cryptography, Wiley, 1996.
D. Stinson. Cryptography: Theory and Practice, 2nd ed, CRC Press, 2002.
W. Trappe and L. Washington. Introduction to Cryptography with Coding Theory, Prentice Hall, 2002.
SUPPLEMENTAL BOOKS
J. Bamford. Body of Secrets: Anatomy of the Ultra-Secret National Security Agency from the Cold War Through the Dawn of a New Century, Anchor, 2002.
S. Levy. Crypto, Penguin, 2002.
H. Mel and D. Baker. Cryptography Decrypted, Addison-Wesley, 2001.
S. Singh. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography, Anchor, 2000.
Computer Science Curriculum Committee Chair Date
Computer Science Department Chair Date
Undergraduate Curriculum Committee Chair Date