You are here

Cryptography

ECEN 5022
CREDITS: 3

Cryptography

Description: 

Cryptography started out as the art and science of encryption or concealing of information. Classic ciphers like Caesar substitution and the Vigenere system have a long history that spans the time from the Roman Empire to the second World War. With the advent of computers and communication networks like the Internet, stronger cryptographic methods became necessary and the scope broadened to include authentication, message integrity, digital signatures, and other elementary security functions. This course focuses on modern cryptographic methods, algorithms, schemes, and protocols. The necessary mathematical tools from probability theory, computational complexity, algebra, and number theory will be introduced and/or reviewed in self- contained units. Particular emphasis will be placed on practical cryptographic schemes and how to use them appropriately.

Outline: 

In modern societies everyday procedures such as banking, shopping, data archival and retrieval, exchange of documents, etc, have come to be heavily dependent on the availability of immediate electronic communication. Much of this communication takes place over open data networks like the Internet and the World-Wide Web. To ensure privacy and confidentiality, a whole range of cryptographic methods and protocols are needed. This course explores fundamental cryptographic building blocks, how they work, and how to use them in practice.

Benefits: 

  • Learn about modern cryptographic protocols.
  • Understand conventional and public-key crypto systems.
  • Understand authentication and electronic signatures.

Objectives: 

Learn about the building blocks of modern cryptography and how to use them in real-world applications. Study symmetric and asymmetric (public-key) encryption methods, authentication protocols, electronic signature schemes, secure hash functions, and key generation and management.

Prerequisites: 

ECEN 3810 (Intro to Probability Theory) or equivalent with instructor consent.

Hardware/Software: 

Access to e-mail, the Internet, and a math program such as MATLAB or Mathematica.

Proctor: 

Required

Syllabus: 

Any syllabus provided above may not be the most recent version. Please refer to the course syllabus provided by the instructor of this course.

Previous Course Offerings

There are no previous offerings of this course.