The CIM Courses system will be down temporarily undergoing routine maintenance.
Mar 7, 2017 by Catina DeBord (debordcl)
CSCI 4331 : Cryptography
Tue, 07 Mar 2017 09:05:25 GMT
Thu, 23 Feb 2017 17:05:14 GMT
Catalog Pages referencing this course
Computer Science (CSCI)
Programs referencing this course
CSCI-MINOR: Computer Science
Other Courses referencing this course
In The Catalog Description:
CSCI 4531 : Computer Security
CSCI 6331 : Cryptography
School of Engineering and Applied Sciences
Computer Science (CSCI)
Long Course Title
Short Course Title
Number of Credits
Default Grading Method
Repeatable for Credit?
CSCI 2312, CSCI 3212 and CSCI 3313
Frequency of Offering
Are there Course Equivalents?
Are Fees Applicable?
Explanation and Description of Fees
Are Additional Resources Required?
Explanation of Additional Resources
Justification for Additional Resources
Describe any Sources of Additional Funding
Algorithmic principles of cryptography from Julius Caesar to public key cryptography. Key management problems and solutions. Cryptographic systems and applications. Students cannot receive credit for both CSCI 4331 taken while an undergraduate and CSCI 6331 taken while a graduate student. Students in the combined BS/MS program cannot receive credit for both CSCI 4331 and CSCI 6331.
a. The student will be able to understand the difference between perfect secrecy and computational secrecy and the definition of message indistinguishability for computationally bounded and unbounded adversaries.
b. The student will know how Feistel and SPN ciphers are used for encryption, understand the design of AES and DES ciphers, the weaknesses of DES and the impact of any weaknesses discovered in AES in the future.
c. The student will be able to design and analyze an SPN block cipher, and analyze a given SPN block cipher design using linear and differential cryptanalysis.
d. The student will understand the design of stream ciphers and hash functions.
e. The student will understand the public key encryption model, Diffie-Hellman key agreement, RSA and El Gamal encryption and decryption.
f. The student will be able to understand the scope of new attacks on symmetric-key and asymmetric-key ciphers.
Uploaded a Course Syllabus
Explanation of how the course differs from similar GW courses
CCAS - Professional
Course Reviewer Comments