This course will discuss ways to keep data secret and secure from unauthorized users.
Credit: 3 hours
Prerequisite: EE600 or permission of the instructor
Description: This course introduces the basic concepts of cryptography and secure communications.
Various cipher systems will be presented including transposition and substitution systems, rotor machines, and polyalphabetic systems. Block ciphers will also be discussed with emphasis on the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES).
The RSA and Knapsack ciphers will be presented as examples of public key systems. The analysis of linear and non-linear shift registers for the use as key generators in stream ciphers will also be presented. Methods used to attack ciphers will be discussed with emphasis on complexity.
Watermarking and Steganography will also be described with emphasis how how these techniques are used in conjunction with encryption systems to protect multimedia data.
Various case studies of the use of cryptographic systems in communications systems will be presented including a discussion of some of the issues involved with privacy.
Text:
Douglas R. Stinson, Cryptography: Theory and Practice, CRC Press
References:
B. Schneier, Applied Cryptography, Wiley, 1996
H.C.A. van Tilborg, An Introduction to Cryptography, Kluwer, 1988
A.G. Konheim, Cryptography: A Primer, Wiley, 1981
W. Patterson, Mathematical Cryptology, Rownan and Littlefield, 1987
Homework will be assigned periodically.
This course will place emphasis on papers that have appeared in the literature. The main goal of this course is to have fun and discuss issues relative to information security. The social, economic, and political implications of these issues will also be discussed.
More information about the class is available here.