Department of Electrical and Computer Engineering George Mason University Volgenau School of Engineering

General Information

Discusses complex cryptographic algorithms and their implementations in software and hardware. Provides mathematical background necessary to understand, implement, and break modern cryptoalgorithms. Covers implementations of cryptosystems using smart cards, network processors, and other platforms. Discusses side channel attacks against implementations of cryptography, including timing attacks, power analysis, fault analysis, cache attacks, etc. Introduces advanced topics, such as random and pseudorandom number generators, secret sharing, zero-knowledge, and identity based encryption. Requires a semester-long project devoted to implementation of selected algorithms or protocols in software or hardware, and/or comparative analysis of various algorithms, protocols, or implementations.

TypeDayTimeLocation
Lectures Wednesday 4:30 pm -7:10 pm in Engineering Building 1109

Documents

  • Syllabus : (pdf)

Instructor

Dr. Jens-Peter Kaps
Office: Engineering Building, Room 3222
Email: jkaps'at'gmu.edu

Office Hours

  • Monday 4:30 pm to 5:30 pm
  • Thursday 4:30 pm to 5:30 pm

Additional office hours are by appointment only (see the Contact page for how to setup an appointment).


Textbooks

Cryptography and Network Security: Principles and Practice by William Stallings, Prentice Hall; 6th edition, 2013, ISBN: 978-0-13-335469-0

Handbook of Applied Cryptography by Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone, CRC Press, Inc.; 1996, ISBN: 0-84-938523-7. (all chapters of this book can be downloaded from the book web page)

You can find links to more interesting books on the Literature page.