## General Information

Discusses complex cryptographic algorithms and their implementations in software and hardware. Provides mathematical background necessary to understand, implement, and break modern cryptoalgorithms. Covers implementations of cryptosystems using smart cards, network processors, and other platforms. Discusses side channel attacks against implementations of cryptography, including timing attacks, power analysis, fault analysis, cache attacks, etc. Introduces advanced topics, such as random and pseudorandom number generators, secret sharing, zero-knowledge, and identity based encryption. Requires a semester-long project devoted to implementation of selected algorithms or protocols in software or hardware, and/or comparative analysis of various algorithms, protocols, or implementations.

Type | Day | Time | Location | |
---|---|---|---|---|

Lectures | Wednesday | 4:30 pm - | 7:10 pm | in Engineering Building 1110 |

## Documents

## Instructor

Dr. Jens-Peter Kaps

Office: Engineering Building, Room 3222

Email: jkaps'at'gmu.edu

### Office Hours

- Monday 4:30 pm to 5:30 pm
- Wednesday 11:00 am to noon

Additional office hours are by appointment only (see the Contact page for how to setup an appointment).

## Textbooks

*
Cryptography and Network Security: Principles and Practice*
by William Stallings,
Prentice Hall; 7th edition, 2016,
ISBN: 978-0134444284.
You can also use the 6th edition.

*
Handbook of Applied Cryptography*
by Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone,
CRC Press, Inc.; 1996,
ISBN: 0-84-938523-7.
(all chapters of this book can be downloaded from the
book web page)

*
Understanding Cryptography*
by Christof Paar and Jan Pelzl,
Springer-Verlag, 2009,
ISBN: 978-3-642-04101-3.
If you are a Mason student you can access this book on
Springer Link.

You can find links to more interesting books on the Literature page.