This course provides an overview of encryption and computer security topics including classical encryption techniques, block ciphers, data encryption standards, finite fields, advanced encryption standards, symmetric encryption, public key cryptography, key management, hash functions, digital signatures, authentication applications, and cryptographic protocols. Students will learn the concepts through lectures, a textbook, projects and exams. The course aims to help students understand and work with these fundamental cryptography and security techniques.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
218 views
EECE 632 - Cryptography and Computer Security
This course provides an overview of encryption and computer security topics including classical encryption techniques, block ciphers, data encryption standards, finite fields, advanced encryption standards, symmetric encryption, public key cryptography, key management, hash functions, digital signatures, authentication applications, and cryptographic protocols. Students will learn the concepts through lectures, a textbook, projects and exams. The course aims to help students understand and work with these fundamental cryptography and security techniques.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 4
DDepartmentt of Electriical and Coomputer Enngineeringg Departmentt of Electriic
al and Coomputer Enngineeringg
Facullty of Engiineering annd Architeccture AAmerican UUniversity of Beirut EEECE 632: CCryptograaphy and CComputerr Security Cataalogue Descrription: This course provvides an oveerview of enncryption annd computer security. T opic s includde classiical encrypttion techniquues, block cciphers and the data enncryption staa ndard, finitte fieldss, advanced encryption sstandard, connfidentialityy using symmmetric encry pption, publicckey cryptographhy, key mannagement, hhash and MMAC algoritthms, digitaal signatures, autheentication appplications, aand cryptographic protoccols. Creddit hours: 3 ccredits Requuired or elecctive: Restrictive Electivve for CCE sstudents, Eleective for E CCE students Prereequisites: . By Coursse: Junior staanding . By Topicc: Probabilityy Theory, Inttroduction too Algorithmms Textbbook: Will iam Stallinggs, Cryptoography andd Network Security Prrinciples annd Practtices , Fifth Edition, Preentice Hall, 22010. Courrse Objectivves To provide an ooverview of encryption and compuuter security y based on tthe fol lowinng topics: Classical encryption techniques, block cipheers and the ddata encrypttio n standardd, finitee fields, adv anced encryyption standaard, confide entiality usinng symmet riic encryptionn, publiic-key cryptoography, keyy managemeent, hash andd MAC algorrithms, digittal signatures, autheentication appplications, aand cryptographic protoccols. Courrse Topics 1. 2. 3. 4. 5. 6.
Classical Enncryption Teechniques
Block Ciphhers and the DData Encrypption Standarrd Finite Fieldds Advanced EEncryption SStandard Confidentiaality using Syymmetric Enncryption Introductionn to Numberr Theory
7. Public-Key Cryptograpphy and RSAA
8. Key Managgement 9. Message Auuthenticationn and Hash ffunctions 10. Hash and MMAC Algoritthms 11. Digital Signnatures and AAuthenticatiion Protocolss
12. Authentication Applications
13. Cryptographic Protocols Course Learning Outcomes 1. Work with Classical encryption techniques 2. Work with block ciphers and the data encryption standard 3. Work with advanced encryption standard 4. Understand confidentiality using symmetric encryption 5. Work with public-key cryptography and RSA 6. Understand key management 7. Work with message authentication and hash functions 8. Work with hash and MAC algorithms 9. Work with digital signatures and authentication protocols 10. Understand authentication applications 11. Understand cryptographic protocols Class schedule: Two 75-minute lectures per week Resources of the course: Textbook and Moodle Evaluation methods . Project or Research Paper 30% . Midterm 30% . Final Exam 40% Professional Components Engineering topics: 80% General education: 0% Mathematics and basic sciences: 20% Person(s) who prepared this description and date of preparation Ali Chehab, February 2013