CSE539: Applied Cryptography

Information Assurance          Computer Science and Eng.         Fulton School of Eng.

   
 

Home Description Text Book Lecture Notes Course Instances Announcements Projects Assignments Resource Links Contact

 

Course Description


Cryptographic protocols allow a group of people to communicate, plot, and perform intensively complex tasks even if there is no trust amongst them. Such protocols allow the creation of unforgeable electronic documents (via digital signatures), the creation of electronic checks (that cannot be copied), the ability to do all or nothing disclosures (“I will tell you only if you tell me”) and a plethora of such important functions; all the way up to digital cash (untraceable, unforgeable electronic currency). Cryptographic protocols are incredibly important in today’s wired world. Use of cryptography allows trusted communications trusted electronic commerce and prevention of fraud on the Internet community.

The course covers three major topics: Cryptographic Algorithms, Cryptographic Protocols and Cryptographic Techniques. The algorithms embody the art of encryption. The cryptographic protocols will expose the audience to the fascinating world of building trust on untrusted relationships. And finally the Cryptographic Techniques will discuss the methodology used in key management and algorithm choice.
 

Topics

1.  Introduction

bullet

What is Cryptography?

bullet

Encryption and Cryptanalysis

bullet

Steganograpy

bullet

Vulnerabilities, privacy and Threats

2.  Basic Cryptographic Algorithms

bullet

Encryption schemes

bullet

Random numbers

bullet

Security of encryption methods

bullet

Public Key encryption

3.  Basic Cryptographic Protocols

bullet

Key Exchange

bullet

Authentication

bullet

Public Key Algorithms

bullet

Digital Signatures

bullet

Secret Sharing

bullet

Digital Certificates

4  .Intermediate Protocols
bulletSSL Secure Sockets Layer
bulletTimestamping services
bulletSubliminal Channels
bulletUndeniable signatures
bulletBit commitment
bulletCoin flipping on the telephone
bulletAll or nothing disclosure of secrets

5.  Advanced Protocols

bullet· Zero Knowledge Proofs
bullet· Digital Certified Mail
bullet· Elections
bullet· Digital Cash

6.  Cryptographic Techniques

bullet· DES
bullet· RSA
bullet· DSA
bullet· Key Management
bullet· Compromised key handling

7.The Real World

bullet· Commonly used software
bullet· The law and Cryptography
bullet· Politics

Course Evaluation

The students in the course are expected to attend all classes (or watch videos if online) and participate in discussions. The projects, homeworks and exams will be used to evaluate student performance.