King Fahd University of Petroleum & Minerals
College of Computer Sciences and Engineering
ICS 555: Data Security and Encryption (3-0-3)
Fall Semester 2009-2010 (091)
Course Information
<< Syllabus >>
N.B. All course material and related resources are made available
through WebCT (Blackboard CE 8) and will be added here soon.
Class Time, Venue and Instructor Information:
Sec. |
Time |
Venue |
Instructor |
Office Hours |
01 |
SM 8:00-09:15pm |
22-119 |
Dr. EL-SAYED EL-ALFY Office: 22-108 Phone: 03-860-1930, E-mail: alfy@kfupm.edu.sa, |
SMW 11:00:11:59am |
Course Catalog Description:
Mathematical principles of cryptography and data security. A detailed study of conventional and modern cryptosystems. Zero knowledge protocols. Information theory, Number theory, complexity theory concepts and their applications to cryptography.
Pre-requisite: Graduate Standing. (Recommended: ICS 353 or any course on principles of algorithms)
Objectives
Introduce students to the basic concepts of number theory and algorithms underlying cryptography and data security.
Explore a
variety of existing cryptosystems and develop problem-solving skills for
cryptographic problems.
Learning Outcomes
Upon completion of the course, you should be able to:
- 1. understand basic concepts in number theory and apply modular arithmetic in problem solving
2. explain the setups, protocols, and security issues of some conventional and modern cryptosystems
3. design secure crypto-schemes to achieve simple tasks and explain their security issues.
Required Material
B. A. Forouzan, Cryptography and Network Security, McGraw Hill 2007. (Available at KFUPM bookstore)
W. Stallings, Cryptography and Network Security: Principles and Practice, (4th Edition, Prentice-Hall, 2006). 5th Edition is upcoming in Dec. 2009. The The book's online website contains numerous useful resources. (Available at KFUPM Library)
Lecture notes and some pointed websites and papers
Other Recommended References
S. Goldwasser and M. Bellare, Lecture Notes on Cryptography. MIT, 1996-2008 *
M. Bellare & P. Rogaway, Introduction to Modern Cryptography, UCSD, 2005. *
C. Paar, Applied Cryptography and Data Security. Ruhr-Universitat Bochum, Germany, 2005. *
D. Stinson, Cryptography: Theory and Practice, 3rd Edition, CRC Press, 2005.
A. Menezes, P. Oorschot, & S. Vanstone, Handbook of Applied Cryptography, 2001. *
N. Koblitz, A Course in Number Theory and Cryptography, 2nd edition, 1994. *
N. Ferguson & B. Schneier, Practical Cryptography, John Wiley & Sons, 2003. (Based on Applied Cryptography: Protocols, Algorithms, and Source Code in C, by B. Schneier, 2nd Edition, John Wiley & Sons, 1996.)
M. Welschenbach, Cryptography in C and C++, Apress, 2001.
* softcopy is available online
Grading Policy
Assessment Tool |
Weight |
Class work
|
40 % |
Midterm Exam (Date: Nov. 16, Room: in-class) |
25 % |
Final Exam [Date & Venue: as announced by the registrar] |
35 % |
Tentative Major Topics
1. Introduction to Data Security and Cryptography
2. Basics of Number Theory and Algebraic Structures Related to Cryptography
3. Symmetric-Key Cryptography and Cryptosystems: Conventional and Modern Block and Stream Symmetric-Key Ciphers, DES, 3DES, AES
4. Public-Key Cryptography: RSA, Diffie-Hellman, Massey-Omura, Rabin, ElGamal
5. Message Integrity and Cryptographic Hash Functions
6. Digital Signature, Authentication and Key Management
Previous Exams
Additional Notes
888 Best of luck!! 888
Repository of Additional Related Resources
Some Related Books, Dictionaries and Survey Papers
Related Courses
Related Conferences & Workshops
The 12th IMA International Conference on Cryptography and Coding, 2009
IACR Calendar of Events in Cryptology
Cryptography and Security Conferences 2009
Related Journals
International Journal of Computer Science and Network Security (IJCSNS)
Societies
Software Links
Some Steganography Related Resources
Some related resources on Cryptography + Parallel Computing
Some Tools
Skills
Other Resources