The CIM Courses system will be down temporarily undergoing routine maintenance.
Apr 13, 2017 by Catina DeBord (debordcl)
CSCI 6331 : Cryptography
Thu, 13 Apr 2017 16:05:50 GMT
Wed, 22 Mar 2017 23:16:06 GMT
Catalog Pages referencing this course
Computer Science (CSCI)
Programs referencing this course
CSIA-GC: Computer Security and Information Assurance
Other Courses referencing this course
In The Catalog Prerequisites:
CSCI 8331 : Advanced Cryptography
School of Engineering and Applied Sciences
Computer Science (CSCI)
Long Course Title
Short Course Title
Number of Credits
Default Grading Method
Repeatable for Credit?
Frequency of Offering
Are there Course Equivalents?
Are Fees Applicable?
Explanation and Description of Fees
Are Additional Resources Required?
Explanation of Additional Resources
Justification for Additional Resources
Describe any Sources of Additional Funding
Review of mathematical theory for cryptography; classical ciphers; modern block and stream ciphers; symmetric and asymmetric systems; digital signatures; public key infrastructure; authentication. Students cannot receive credit for both CSCI 4331 taken while an undergraduate and CSCI 6331 taken while a graduate student. Students in the combined BS/MS program cannot receive credit for both CSCI 4331 and CSCI 6331.
a. The student will be able to understand the difference between perfect secrecy and computational secrecy and the definition of message indistinguishability for computationally bounded and unbounded adversaries.
b. The student will know how Feistel and SPN ciphers are used for encryption, understand the design of AES and DES ciphers, the weaknesses of DES and the impact of any weaknesses discovered in AES in the future.
c. The student will be able to design and analyze an SPN block cipher, and analyze a given SPN block cipher design using linear and differential cryptanalysis.
d. The student will understand the design of stream ciphers and hash functions.
e. The student will understand the public key encryption model, Diffie-Hellman key agreement, RSA and El Gamal encryption and decryption.
f. The student will be able to understand the scope of new attacks on symmetric-key and asymmetric-key ciphers.
Uploaded a Course Syllabus
Explanation of how the course differs from similar GW courses
CCAS - Professional
Course Reviewer Comments
Wed, 22 Feb 2017 14:55:24 GMT
Rollback: Please add independent learning statement to syllabus.
Wed, 22 Feb 2017 15:03:48 GMT
Rollback: learning objectives missing