CSCI 4613


None
Course Number:
CSCI 4613

Approved Starting Semester:
Fall 2022

Course Title:
Cryptography

Course Description (Bulletin Description):
This course introduces students to the methods of cryptography and cryptanalysis. Students will learn how to use symmetric and asymmetric cryptographic primitives to ensure confidentiality, data integrity, authentication, and non-repudiation. Weaknesses of and attacks on cryptographic systems will also be discussed.

Prerequisite:
CSCI 2500 and CSCI 4200

Co-requisite:
None

Pre/Co-requisite::
None

Dual-Listed:
None

Course Objectives (Course-level Student Learning Outcomes):
At the completion of the course, the student will be able to: 1. Describe the purpose of cryptography and list ways it is used in data communications. 2. Define the following terms: cipher, cryptanalysis, cryptographic algorithm, and cryptology, and describe the two basic methods (ciphers) for transforming plain text in cipher text. 3. Discuss the importance of prime numbers in cryptography and explain their use in cryptographic algorithms. 4. Use cryptographic primitives and describe their basic properties. 5. Illustrate how to measure entropy and how to generate cryptographic randomness. 6. Use public-key primitives and their applications. 7. Explain how key exchange protocols work and how they fail. 8. Summarize security definitions related to attacks on cryptographic primitives, including attacker capabilities and goals. 9. Apply appropriate known cryptographic techniques for a given scenario. 10. Appreciate the dangers of inventing one’s own cryptographic methods.

Topics Covered (In Outline/Calendar):
• Historical ciphers • Attack classification • Computational security • Symmetric key encryption and authentication • Cryptographic hash functions • Public key encryption and authentication

Student Learning Outcomes:
  • Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions. (SLO1)
  • Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline. (SLO2)
Course Coordinator:
Dr. Nicholas Coleman

Instructor-in-charge:
Dr. Nicholas Coleman

Previous Professors:
Dr. Nicholas Coleman

Technologies / Skills:
Cryptography algorithms

Textbook(s):
Spring 2026
Title: SERIOUS CRYPTOGRAPHY
Edition: 18TH
Author: AUMASSON
Publisher: PENG RAND
ISBN: 9781593278267
========================================


Go back to choose another course