DDepartmentt of Electriical and Coomputer Enngineeringg Departmentt of Electriic
al and Coomputer Enngineeringg
Facullty of Engiineering annd Architeccture AAmerican UUniversity of Beirut EEECE 632: CCryptograaphy and CComputerr Security Cataalogue Descrription: This course provvides an oveerview of enncryption annd computer security. T opic s includde classiical encrypttion techniquues, block cciphers and the data enncryption staa ndard, finitte fieldss, advanced encryption sstandard, connfidentialityy using symmmetric encry pption, publicckey cryptographhy, key mannagement, hhash and MMAC algoritthms, digitaal signatures, autheentication appplications, aand cryptographic protoccols. Creddit hours: 3 ccredits Requuired or elecctive: Restrictive Electivve for CCE sstudents, Eleective for E CCE students Prereequisites: . By Coursse: Junior staanding . By Topicc: Probabilityy Theory, Inttroduction too Algorithmms Textbbook: Will iam Stallinggs, Cryptoography andd Network Security Prrinciples annd Practtices , Fifth Edition, Preentice Hall, 22010. Courrse Objectivves To provide an ooverview of encryption and compuuter security y based on tthe fol lowinng topics: Classical encryption techniques, block cipheers and the ddata encrypttio n standardd, finitee fields, adv anced encryyption standaard, confide entiality usinng symmet riic encryptionn, publiic-key cryptoography, keyy managemeent, hash andd MAC algorrithms, digittal signatures, autheentication appplications, aand cryptographic protoccols. Courrse Topics 1. 2. 3. 4. 5. 6.
Classical Enncryption Teechniques
Block Ciphhers and the DData Encrypption Standarrd Finite Fieldds Advanced EEncryption SStandard Confidentiaality using Syymmetric Enncryption Introductionn to Numberr Theory
7. Public-Key Cryptograpphy and RSAA
8. Key Managgement 9. Message Auuthenticationn and Hash ffunctions 10. Hash and MMAC Algoritthms 11. Digital Signnatures and AAuthenticatiion Protocolss
12. Authentication Applications
13. Cryptographic Protocols Course Learning Outcomes 1. Work with Classical encryption techniques 2. Work with block ciphers and the data encryption standard 3. Work with advanced encryption standard 4. Understand confidentiality using symmetric encryption 5. Work with public-key cryptography and RSA 6. Understand key management 7. Work with message authentication and hash functions 8. Work with hash and MAC algorithms 9. Work with digital signatures and authentication protocols 10. Understand authentication applications 11. Understand cryptographic protocols Class schedule: Two 75-minute lectures per week Resources of the course: Textbook and Moodle Evaluation methods . Project or Research Paper 30% . Midterm 30% . Final Exam 40% Professional Components Engineering topics: 80% General education: 0% Mathematics and basic sciences: 20% Person(s) who prepared this description and date of preparation Ali Chehab, February 2013