Learning Outcomes |
PO |
MME |
The students who succeeded in this course: |
|
|
LO-1 |
Can know Diffie-Hellman key exchange. Can perceive public key cryptosystems (ElGamal) and attacks against these systems. |
PO-1 Fundamental theorems of about some sub-theories of Analysis, Applied Mathematics, Geometry, and Algebra can apply to new problems. PO-2 Ability to assimilate mathematic related concepts and associate these concepts with each other.
|
Examination |
LO-2 |
Can learn using Hash functions to encrypt, the digital signature algorithms and security protocols. |
PO-2 Ability to assimilate mathematic related concepts and associate these concepts with each other. PO-3 Mathematics, natural sciences and their branches in these areas and related issues has sufficient infrastructure solutions for the problems of theoretical and practical uses of mathematics. PO-11 Ability to make individual and team work on issues related to working and social life.
|
Examination |
PO: Programme Outcomes MME:Method of measurement & Evaluation |
Course Contents |
Discrete logarithms, Diffie-Hellman key exchange, Public key cryptosystems (ElGamal), Hash functions, Birthday attacks, The secure Hash algorithm, Using Hash functions to encrypt, RSA signatures and the ElGamal signature scheme, The digital signature algorithm, Security protocols |
Weekly Course Content |
Week |
Subject |
Learning Activities and Teaching Methods |
1 |
Discrete logarithms |
Lecturing |
2 |
Discrete logarithms |
Lecturing |
3 |
Diffie-Hellman key exchange |
Lecturing |
4 |
Diffie-Hellman key exchange |
Lecturing |
5 |
Public key cryptosystems (ElGamal) |
Lecturing |
6 |
Public key cryptosystems (ElGamal) |
Lecturing |
7 |
Hash functions |
Lecturing |
8 |
mid-term exam |
|
9 |
Birthday attacks |
Lecturing |
10 |
The secure Hash algorithm |
Lecturing |
11 |
Using Hash functions to encrypt |
Lecturing |
12 |
RSA signatures and the ElGamal signature scheme |
Lecturing |
13 |
The digital signature algorithm |
Lecturing |
14 |
Security protocols |
Lecturing |
15 |
Security protocols |
Lecturing |
16 |
final exam |
|
Recommend Course Book / Supplementary Book/Reading |
1 |
Wade Trappe, Lawrence C. Washington, Introduction to Cryptography with Coding Theory, second ed., Pearson Education, 2007. |
2 |
Douglas Stinson, "Cryptography: Theory and Practice", CRC Press, 2002. |
3 |
Johannes Buchmann, "Introduction to Cryptography", Springer-Verlag, New York, 2001. |
4 |
Cryptography and Network Security: Principles and Practice, 5/E William Stallings, Prentice Hall 2011. |
Required Course instruments and materials |
|