General Information
Discusses complex cryptographic algorithms and their implementations in software and hardware. Provides mathematical background necessary to understand, implement, and break modern cryptoalgorithms. Covers implementations of cryptosystems using smart cards, network processors, and other platforms. Discusses side channel attacks against implementations of cryptography, including timing attacks, power analysis, fault analysis, cache attacks, etc. Introduces advanced topics, such as random and pseudorandom number generators, secret sharing, zero-knowledge, and identity based encryption. Requires a semester-long project devoted to implementation of selected algorithms or protocols in software or hardware, and/or comparative analysis of various algorithms, protocols, or implementations.
Type | Day | Time | Location | |
---|---|---|---|---|
Lectures | Montag | 4:30 pm - | 7:10 pm | in Engineering Building 2608 |
Documents
- Syllabus : (pdf)
Instructor
Dr. Jens-Peter Kaps
Office: Engineering Building, Room 3222
Email: jkaps'at'gmu.edu
Office Hours
Office hours are held in-person in my office and using Zoom. Here is the Zoom link to the Office Hour.
Additional office hours are by appointment only (see the Contact page for how to setup an appointment).
Textbooks
Cryptography and Network Security: Principles and Practice by William Stallings, Prentice Hall; 7th edition, 2016, ISBN: 978-0134444284.
Handbook of Applied Cryptography by Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone, CRC Press, Inc.; 1996, ISBN: 0-84-938523-7. (all chapters of this book can be downloaded from the book web page)
Understanding Cryptography by Christof Paar and Jan Pelzl, Springer-Verlag, 2009, ISBN: 978-3-642-04101-3. If you are a Mason student you can access this book on Springer Link.
You can find links to more interesting books on the Literature page.