MA4570 Cryptography - Foundations and Practice

The methods of secret communication are addressed. Some simple cryptosystems are described and classical techniques of substitution and transposition are considered. The public-key cryptosystems, RSA, Discrete Logarithm and other schemes are introduced. Applications of cryptography and cryptanalysis.

Prerequisite

MA3560

Lecture Hours

4

Lab Hours

1

Course Learning Outcomes

• Understand the main goals of cryptography: confidentiality, integrity, authentication and nonrepudiation

• Understand and analyze Data Encryption Standard (DES), Advanced Encryption Standard (AES)

and other symmetric key systems.

• Understand what a cryptosystem’s strength relies on, understand the relevance of the various steps

in the designs, keyspace size and the computational aspects on breaking a cryptosystem.

• Understand and analyze public key system such as Diffie-Hellman Key Exchange, ElGamal

Cryptosystem, RSA, etc., protocols.

• Known attacks on secret and public key systems

• Analyze hash and MAC algorithms, and digital signatures (for authentication and non-repudiation).