COE 451 - Term 142
(Last edited: Thursday, April 23, 2015 11:17:05 AM)
Office Hours: M/W 11:00 AM - 11:55 AM or by appointment
Class Notes (from the textbook author's website):
00-Introduction | 03-Protocols | 06-Appendix |
01-Crypto | 04-Software | |
02-Access Control | 05-Conclusion |
HW # 01: Textbook Chapter 1 problems 2, 4, 5, 7, 11, and 13 - (Due date: Tuesday 10/2/2015 in class)
HW # 02: Solve the attached problems - (Due date: Tuesday 24/2/2015 in class)
HW # 03: Solve the attached problems - (Due date: Thursday 05/3/2015 in class)
HW # 04: Solve the attached problems - (Due date: Thursday 12/3/2015 in class)
Programming Assignment (Mandatory): Description and expected deliverables are found here - (Due date: Thursday 09/4/2015 in class)
HW # 05: Solve the attached problems - (Due date: Thursday 02/4/2015 in class)
HW # 06: Solve the attached problems - (Due date: Thursday 16/4/2015 in class)
HW # 07: Solve the attached problems - (Due date: Thursday 23/4/2015 in class)
HW # 08: Solve the attached problems - (Due date: Thursday 30/4/2015 in class)
Requirements:
- Solve one of the level II or higher challenges posted at the "Crypto Challenge Contest" website. The code should be your own genuine code J
Deliverables: (Submit the first 3 deliverables on as one zipped file to marwan@kfupm.edu.sa no later than Thursday 07/5/2015. Late submission NOT accepted)
- A properly commented software that implements the cryptosystem of the selected challenge.
- A properly commented software that implements the attack on the cryptosystem of the selected challenge.
- A report that details both the cryptosystem and the attack system, the approach used for the attack system, and the results of the experiments execution that prove the success of the attack system.
- A demo at my office on Monday 11/5/2015.
"Crypto Challenge Contest" website
The Knapsack Cryptosystem Attack Example (scroll down to the bottom of the page)