CENG 471
Cryptography
Basic terminology, history & background, Symmetrical cryptosystems, DES-AES, DES-AES likes, Asymmetrical cryptosystems, primality, hashing, factorization based (RSA)- ECC-Lattice cryptosystems, cryptographic protocols & applications, secrecy, authentication, integrity-authenticity, digital signatures, standards.
Course Objectives
To teach the security functions. To teach that which security functions are realized by which cryptographic tools. Teaching the relationship between the historical evolution of the symmetrical/asymmetrical cryptosystems and the developments of the technological and social life. Teaching that how the measure of the security level for cryptographic solutions and how the implement the international standards. To teach the currently relevant security solutions of information and communication technologies.
Recommended or Required Reading
W.Trappe, L.Washington, ‘Introduction to Cryptography with Coding Theory’, Pearson, 2006 ,P. Gutman, ‘Cryptographic Security Architecture’, Springer, 2004 ,D. R. Stinson, ‘Cryptography, Theory and Practice’, Chapman & Hall/CRC Press, 2002 ,B. Schneider, ‘Applied Cryptography, Protocols, Algorithms, and Source Code in C’, John Wiley & Sons, 1996
Learning Outcomes
1. Analyze vulnerabilities, threats and which security functions are realized.
2. Selection, implementation and testing of cryptographic tools for essential security functions.
3. Objectively read the technological evolution and efficiently analyzing of new requirements for the cryptographic solutions.
4. Usage ability of the international standards for the developed cryptographic solutions.
5. Selection of the best solution and implementation ability for a cryptographic security solution depends on security requirements of domain.
| Topics |
|
Introduction to Cryptography with basic definitions and concepts
|
|
Information Theory and Probability Theory and Cryptography
|
| Monoalphebetical and Polyalphabetical Crypto |
| Transpositions-Permutations |
| Block Ciphering, DES and AES |
|
Symmetrical Key Management and Security Architecture
|
| Symmetrical Cryptosystem Design and Verification |
| Introduction to Number Theory I |
| Introduction to Number Theory II |
|
Factorization based Asymmetrical Cryptosystems – RSA
|
|
Discrete Logarithm Problem and Cryptosystems: DHKE, ElGamal
|
| Elliptic Curve Cryptosystems- ECC |
| Public Key Infrastructures |
| Design of Cryptographic Protocols: FIPS 140-2/3 |
Grading
Midterm: 25%
Homework: 30%
Presentation: 20%
Final: 25%
- CENG 400
- CENG 411
- CENG 415
- CENG 416
- CENG 418
- CENG 421
- CENG 422
- CENG 424
- CENG 431
- CENG 432
- CENG 433
- CENG 434
- CENG 435
- CENG 436
- CENG 437
- CENG 441
- CENG 442
- CENG 443
- CENG 444
- CENG 451
- CENG 452
- CENG 461
- CENG 462
- CENG 463
- CENG 464
- CENG 465
- CENG 467
- CENG 472
- CENG 473
- CENG 481
- CENG 482
- CENG 483
- CENG 484
- CENG 485
- CENG 486
- CENG 487
- CENG 488
- CENG 491
- CENG 499
