Anda di halaman 1dari 4

DDepartmentt of Electriical and Coomputer Enngineeringg Departmentt of Electriic

al and Coomputer Enngineeringg


Facullty of Engiineering annd Architeccture
AAmerican UUniversity of Beirut
EEECE 632: CCryptograaphy and CComputerr Security
Cataalogue Descrription:
This course provvides an oveerview of enncryption annd computer security. T opic
s includde
classiical encrypttion techniquues, block cciphers and the data enncryption staa
ndard, finitte
fieldss, advanced encryption sstandard, connfidentialityy using symmmetric encry
pption, publicckey
cryptographhy, key mannagement, hhash and MMAC algoritthms, digitaal signatures,
autheentication appplications, aand cryptographic protoccols.
Creddit hours: 3 ccredits
Requuired or elecctive: Restrictive Electivve for CCE sstudents, Eleective for E
CCE students
Prereequisites:
.
By Coursse: Junior staanding
.
By Topicc: Probabilityy Theory, Inttroduction too Algorithmms
Textbbook:
Will iam Stallinggs, Cryptoography andd Network Security Prrinciples annd
Practtices , Fifth Edition, Preentice Hall, 22010.
Courrse Objectivves
To provide an ooverview of encryption and compuuter security y based on tthe fol
lowinng
topics: Classical encryption techniques, block cipheers and the ddata encrypttio
n standardd,
finitee fields, adv anced encryyption standaard, confide entiality usinng symmet
riic encryptionn,
publiic-key cryptoography, keyy managemeent, hash andd MAC algorrithms, digittal
signatures,
autheentication appplications, aand cryptographic protoccols.
Courrse Topics
1.
2.
3.
4.
5.
6.

Classical Enncryption Teechniques


Block Ciphhers and the DData Encrypption Standarrd
Finite Fieldds
Advanced EEncryption SStandard
Confidentiaality using Syymmetric Enncryption
Introductionn to Numberr Theory

7. Public-Key Cryptograpphy and RSAA


8. Key Managgement
9. Message Auuthenticationn and Hash ffunctions
10. Hash and MMAC Algoritthms
11. Digital Signnatures and AAuthenticatiion Protocolss

12. Authentication Applications


13. Cryptographic Protocols
Course Learning Outcomes
1. Work with Classical encryption techniques
2. Work with block ciphers and the data encryption standard
3. Work with advanced encryption standard
4. Understand confidentiality using symmetric encryption
5. Work with public-key cryptography and RSA
6. Understand key management
7. Work with message authentication and hash functions
8. Work with hash and MAC algorithms
9. Work with digital signatures and authentication protocols
10. Understand authentication applications
11. Understand cryptographic protocols
Class schedule: Two 75-minute lectures per week
Resources of the course: Textbook and Moodle
Evaluation methods
.
Project or Research Paper 30%
.
Midterm 30%
.
Final Exam 40%
Professional Components
Engineering topics: 80%
General education: 0%
Mathematics and basic sciences: 20%
Person(s) who prepared this description and date of preparation
Ali Chehab, February 2013

Anda mungkin juga menyukai