Cryptography and Computer Security - Course Outline
- Need for computer security, threats & countermeasures
- Classical cryptography: lectures 1-2
- Caesar cipher, monoalphabetic substitution
- One-time pads
- Modern private key ciphers: lectures 2-7
- Basic DES, DES modes of operations, Triple DES
- RC4, attacks on RC4 & WEP
- Meet in the Middle attacks
- AES (Rijndael)
- Math that will be covered: Birthday paradox
(probability and combinatorics), Finite fields (Algebra)
- Public-key cryptography: lectures 8-12
- RSA encryption and signatures
- Primality: Rabin-Miller, Factoring: Pollard Rho
- Discrete Logs: Diffie-Hellman, El-Gamal
- Cryptographic hash functions
- Math that will be covered: Basic number theory,
Chinese remainder theorem