Module:
Cryptography
Created: Aug.4,
2003
Updated:
Feb.19,2004
Module version
number: Version 0.1
Author: George C.
Collins
Code:
CRYP
Objectives
The Cryptogrphy
module covers the fundamental methods of encryption, decryption, analysis of
cryptogrphic methods, well-known encryption systems, and cryptographic
protocols
Prerequisite
Discrete
Math
Programming
in C
Submodules
| |||||
Submodule
# |
Title |
code |
Description |
Prerequisite |
*Referenced
module |
1 |
Cryp1 |
Introduction to cryptography
and cryptanalysis; study of simple encryption involving substitution and
transposition, including monoalphabetic and polyalphabetic substitutions,
Vigenere tableau, and the Kasiski method. |
None |
? | |
2 |
Cryp2 |
Further study of
cryptography and cryptanalysis, including index of coincidence, columnar
transpositions, fractionated Morse; review of fundamental concepts such as
confusion, diffusion, stream ciphers, block
ciphers. |
? |
? | |
3 |
Cryp3 |
Introduction to hard
(NP-complete) problems; review of modular arithmetic; symmetric versus
asymmetric algorithms; the Data Encryption Standard (DES), Double-DES,
Triple-DES; key escrow and the Clipper proposal;
AES. |
? |
? | |
4 |
Cryp4 |
Asymmetric
(public-key)algorithms: Merkle-Hellman Knapsacks, RSA algorithm, El
Gamal algorithm; Secure Hash Algorithm(SHA). |
? |
?? | |
5 |
Cryp5 |
Key
distribution, digital certificates, digital signatures, mental
poker. |
? |
? | |
6 |
Cryptographic
Protocols 2 |
Cryp6 |
E-voting protocols, oblivious
transfer, digital contract signing, certified
mail. |
? |
? |
7 |
Example
Applications |
Cryp7 |
Examples of the use of
encryption in database applications, secure programming, operating systems
and commercial products |
? |
? |
Resources
Glossary