CS 411/507 Cryptography
Fall Term 2017
W. Trappe & L. C. Washington. Introduction to Cryptography
with Coding Theory, 2nd Edition, Prentice-Hall, 2006. ISBN:
- Nigel P. Smart. Cryptography Made Simple.
Springer, 2016. ISBN 978-3-319-21936-3
- C. Paar and J. Pelzl. Understanding Cryptography: A Textbook for
Students and Practitioners. Springer, 2010. ISBN 978-3-642-04100-6
- J. Menezes, P. C. van Oorschot and S. A. Vanstone. Handbook of Applied
Cryptography, CRC Press, 1997. ISBN: 0-8493-8523-7.Most of the
chapters of this book is available online free of charge. Please click
on the name of the book to access to the chapters in pdf
format. And please read the copyright notice.
- D. R. Stinson, Cryptography, Theory and Practice,
3rd Edition, Chapman & Hall/CRC, 2006. ISBN:
Time & Place
- Monday 08:40 - 10:30
- Wednesday 14:40 -
15:30 FENS G035
Office Hours: Wednesday 15:40-16:30 or by appointment
Teaching Assistant: Atıl Utku Ay
Hours of TA: TBA
This is an introductory course
on the methods, algorithms, techniques, and tools of data security and
cryptography. After studying the theoretical aspects of cryptographic
algorithms and protocols, we show how these techniques can be integrated to
solve particular data and communication security problems. This course
material is of use to computer and communication engineers who are interested
in embedding security into an information system, and thus, providing
integrity, confidentiality, and authenticity of the documents and the
- Introduction and
Classical Cryptosystems: Secure communication. Attacks to
cryptosystems. Classical cryptographic techniques and algorithms. One
time pad, randomness and pseudo-randomness
Foundations: Number theory. Finite fields. Primitive roots. Square roots.
Exponentiation and discrete logarithm.
Cryptography: Block ciphers and stream ciphers. DES, AES (Rijndael). Modes of operation.
Cryptography: One-way functions. Trapdoor one-way functions.
Public-key cryptosystems. RSA, Diffie-Hellman,
ElGamal, and elliptic curve cryptosystems.
and Digital Signatures: Cryptographic checksums. Hash functions and
message-digest functions. Digital signatures. Authentication protocols.
- Protocols: Zero-knowledge
proof systems. Identification protocols. Key management architectures.
Handwritten assignments are not acceptable
- number theory,
- stream ciphers
- block ciphers &
- Advanced Encryption
- Public Key
Cryptography and RSA
- Discrete Logarithm
- Elliptic Curve
- Digital Signatures
- Secret Sharing
- Zero Knowledge
- Key Establishment
- Midterm: 30 %
- Final: 35 %
- HW Assignments: 20 %
- Project: 15 %
- First midterm:
- Final: As
scheduled by registrar
for Fall 2015
- Project Requirements
- Proposal Due
- Electronic Copy
Due Date: TBA
This class is open to graduate and graduate students.
Experience in a programming language is required.
Dr. Erkay Savas