EECE 632 - Cryptography and Computer Security

Published on February 2017 | Categories: Documents | Downloads: 27 | Comments: 0 | Views: 345
of 4
Download PDF   Embed   Report

Comments

Content

 

DDepartmentt of Electriical and Coomputer Enngineeringg Departmentt of Electriic al and Coomputer Enngineeringg

Facullty of Engiineering annd Architeccture AAmerican UUniversity of Beirut

EEECE 632: CCryptograaphy and CComputerr Security Cataalogue Descrription: This course provvides an oveerview of enncryption annd computer security. T opic s includde encrypttion techniquues, block cciphers and the data enncryption staa classiical ndard, finitte fieldss, advanced encryption sstandard, connfidentialityy using symmmetric encry pption, publicckey cryptographhy, key mannagement, hhash and MMAC algoritthms, digitaal signatures,   autheentication appplications, aand cryptographic protoccols. Creddit hours: 3 ccredits Requuired or elecctive: Restrictive Electivve for CCE sstudents, Eleective for E CCE students Prereequisites: . By Coursse: Junior staanding . By Topicc: Probabilityy Theory, Inttroduction too Algorithmms Textbbook: Will iam Stallinggs, Cryptoography andd Network Security Prrinciples annd Practtices Practtices , Fifth Edition, Preentice Hall, 22010. Courrse Objectivves To provide an ooverview of encryption and compuuter security y based on tthe fol lowinng topics: Classical encryption techniques, block cipheers and the ddata encrypttio n standardd, finitee fields, adv anced encryyption standaard, confide entiality usinng symmet riic encryptionn, publiic-key cryptoography, keyy managemeent, hash andd MAC algorrithms, digittal  signatures, autheentication appplications, aand cryptographic protoccols. Courrse Topics 1. 2. 3. 4. 5. 6.

Classical Enncryption Teechniques Block Ciphhers and the DData Encrypption Standarrd Finite Fieldds Advanced EEncryption SStandard Confidentiaality using Syymmetric Enncryption Introductionn to Numberr Theory

 

7. Public-Key Cryptograpphy and RSAA 8. Key Managgement 9. Message Auuthenticationn and Hash ffunctions 10. Hash and MMAC Algoritthms 11. Digital Signnatures and AAuthenticatiion Protocolss

 

12. Authentication Applications 13. Cryptographic Protocols Course Learning Outcomes 1. 2. 3. 4. 5. 6. 7. 8.

Work with Classical encryption techniques Work with block ciphers and the data encryption standard Work with advanced encryption standard Understand confidentiality using symmetric encryption Work with public-key cryptography and RSA Understand key management Work with message authentication and hash functions Work with hash and MAC algorithms

9. with digital signatures and authentication protocols 10.Work Understand authentication applications 11. Understand cryptographic protocols Class schedule: Two 75-minute lectures per week Resources of the course: Textbook and Moodle Evaluation methods . Project or Research Paper 30% . Midterm 30% . Final Exam 40%

Professional Components Engineering topics: 80% General education: 0% Mathematics and basic sciences: 20%

Person(s) who prepared this description and date of preparation Ali Chehab, February 2013

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close