40 hours over 10 weeks (2 two-hour meetings per week)
Mathematical foundations for information security (number theory,
finite fields, discrete logarithms, information theory, elliptic
curves). Cryptography. Encryption systems (classical, DES, Rijndael,
RSA). Cryptanalytic techniques. Simple protocols. Techniques for data
security (digital signatures, hash algorithms, secret sharing,
zero-knowledge techniques). Prerequisite: Mathematical maturity at
least at the level of upper-division engineering students.
Course Learning Objective:
Understanding of basic notions of cryptology and the underlying
mathematical ideas and techniques. Proficiency in several encryption
and decryption techniques. Awareness of simple protocols and techniques
for data security.
Vulnerabilities in and threats to information security. Tools (such as
encryption, key management, and cryptographic strength) for protecting
communications, data, files, information, and keying material.
Applications of cryptography to identification, authentication, and
Method of Instruction:
Lecture, assignments, projects, presentations
Tests, assignments, projects, presentations
| © 2006 Center for
Advanced Study and Practice of
Information Assurance (CASPIA), Santa Clara University