General Information
Topics include need for security services in computer networks, basic concepts of cryptology, historical ciphers, modern symmetric ciphers, public key cryptography (RSA, elliptic curve cryptosystems), efficient hardware and software implementations of cryptographic primitives, requirements for implementation of cryptographic modules, data integrity and authentication, digital signature schemes, key exchange and key management, standard protocols for secure mail, the web and electronic payments, security aspects of mobile communications, key escrow schemes, zero-knowledge identification schemes, smart cards, quantum cryptography, and quantum computing.
Type | Day | Time | Location | |
---|---|---|---|---|
Lectures | Tuesday | 7:20 pm - | 10:00 pm | in Exploratory Hall L111 |
Documents
- Syllabus: (pdf)
Instructor
Dr. Jens-Peter Kaps
Office: Engineering Building, Room 3222
Email: jkaps'at'gmu.edu
Office Hours
- Tuesday 2:00 pm to 3:00 pm
- Wednesday 4:30 pm to 5:30 pm
Additional office hours are by appointment only (see the Contact page for how to setup an appointment).
Teaching Assistant
Name | Office Hours | Office | |
---|---|---|---|
Rabia Shahid | rshahid'at'gmu.edu | Monday 2:00 pm - 4:00 pm | ENGR 3204 |
Wednesday 11:00 am - 1:00 pm | ENGR 3203 |
Textbooks
Cryptography and Network Security: Principles and Practice by William Stallings, Prentice Hall; 7th edition, 2016, ISBN: 978-0134444284. You can also use the 6th edition.
Handbook of Applied Cryptography by Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone, CRC Press, Inc.; 1996, ISBN: 0-84-938523-7. (all chapters of this book can be downloaded from the book web page)
You can find links to more interesting books on the Literature page.