Alan Kaminsky Department of Computer Science Rochester Institute of Technology 4486 + 2220 = 6706
Home Page
Cryptography 4003-482-01/4005-705-01 Spring Quarter 2013
Course Page

4003-482-01/4005-705-01 Cryptography

Prof. Alan Kaminsky -- Spring Quarter 2013
Rochester Institute of Technology -- Department of Computer Science

Time: Tuesdays and Thursdays, 2:00pm-3:50pm, Room 70-2690
Final Exam: Monday, 13-May-2013, 12:30pm-2:30pm, Room 70-2690

Required textbook: Christof Paar and Jan Pelzl, Understanding Cryptography: A Textbook for Students and Practitioners (Springer-Verlag, 2010).
[Free online version available from the SpringerLink database via the RIT Wallace Library web site]

Supplementary textbook: Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone, Handbook of Applied Cryptography (CRC Press, 1997).
[Free online version]


What's New   Last updated 15-May-2013 5:21pm
Posted the grades for the final exam and . . . more »
General Information
-   Course Prerequisites and Outcomes
-   Course Grading and Policies
-   Course Schedule and Topics
-   Bibliography and Links
-   Wallace Library's GCCIS web page
-   Grade Calculator: Undergraduate -- Graduate
-   Encrypted Grades
Assignments
-   Undergraduate Team Project
-   Graduate Team Project
-   Take-Home Quiz 1 -- Solutions
-   Take-Home Quiz 2 -- Solutions
-   Take-Home Quiz 3 -- Solutions
-   Take-Home Quiz 4 -- Solutions
Software
-   Parallel Java Library
-   Computer Science Course Library
Lecture Materials
Ch. 1.   Introduction to Cryptography
Ch. 2.   Stream Ciphers
   Practical: Coding Crypto
   Practical: Stream Cipher Implementation
Ch. 3.   Data Encryption Standard
   Practical: Block Cipher Implementation
Ch. 4.   Advanced Encryption Standard
Ch. 5.   More About Block Ciphers
   Practical: Block Cipher Mode Implementation
Structural Attacks on Block Ciphers
Ch. 11.   Hash Functions
   Practical: Hash Function Implementation
  Cryptographic One-Way Hash Functions
  Message Digests for the Twenty-First Century
Ch. 12.   Message Authentication Codes
Ch. 6.   Introduction to Public-Key Cryptography
Ch. 7.   The RSA Cryptosystem
Ch. 8.   Public-Key Cryptosystems Based on the DLP
Ch. 9.   Elliptic Curve Cryptosystems
Ch. 10.   Digital Signatures
Ch. 13.   Key Establishment
Research Topics
Team Web Sites
Undergraduate Teams
U1.   Team DES -- Blowfish block cipher U5.   Team The A-Team -- HC-128 stream cipher
U2.   Team DDK -- Rabbit stream cipher U6.   Team Cypherpunks -- IDEA block cipher
U3.   Team Men In Black -- Twofish block cipher U7.   Team French Toast Mafia -- Serpent block cipher
U4.   Team ASK -- Whirlpool hash function     
Graduate Teams
G1.   Team RZC -- FEAL block cipher G4.   Team ACD -- TEA block cipher
G2.   Team 24 -- RC5 block cipher G5.   Team Cryptanal-ICE -- ICE block cipher
G3.   Team New HIGHT -- HIGHT block cipher     

Cryptography 4003-482-01/4005-705-01 Spring Quarter 2013
Course Page
Alan Kaminsky Department of Computer Science Rochester Institute of Technology 4486 + 2220 = 6706
Home Page
Copyright © 2013 Alan Kaminsky. All rights reserved. Last updated 15-May-2013. Please send comments to ark­@­cs.rit.edu.