General Information
Discusses complex cryptographic algorithms and their implementations in software and hardware. Provides mathematical background necessary to understand, implement, and break modern cryptoalgorithms. Covers implementations of cryptosystems using smart cards, network processors, and other platforms. Discusses side channel attacks against implementations of cryptography, including timing attacks, power analysis, fault analysis, cache attacks, etc. Introduces advanced topics, such as random and pseudorandom number generators, secret sharing, zero-knowledge, and identity based encryption. Requires a semester-long project devoted to implementation of selected algorithms or protocols in software or hardware, and/or comparative analysis of various algorithms, protocols, or implementations.
Type | Day | Time | Location | |
---|---|---|---|---|
Lectures | Wednesday | 4:30 pm - | 7:10 pm | in Engineering Building 1110 |
Documents
Instructor
Dr. Jens-Peter Kaps
Office: Engineering Building, Room 3222
Email: jkaps'at'gmu.edu
Office Hours
- Monday 4:30 pm to 5:30 pm
- Wednesday 11:00 am to noon
Additional office hours are by appointment only (see the Contact page for how to setup an appointment).
Textbooks
Cryptography and Network Security: Principles and Practice by William Stallings, Prentice Hall; 7th edition, 2016, ISBN: 978-0134444284. You can also use the 6th edition.
Handbook of Applied Cryptography by Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone, CRC Press, Inc.; 1996, ISBN: 0-84-938523-7. (all chapters of this book can be downloaded from the book web page)
Understanding Cryptography by Christof Paar and Jan Pelzl, Springer-Verlag, 2009, ISBN: 978-3-642-04101-3. If you are a Mason student you can access this book on Springer Link.
You can find links to more interesting books on the Literature page.