ST.CLOUD STATE UNIVERSITY

wanderooswarrenΤεχνίτη Νοημοσύνη και Ρομποτική

21 Νοε 2013 (πριν από 3 χρόνια και 8 μήνες)

63 εμφανίσεις



1

ST.CLOUD STATE UNIVERSITY


CNA 43
8
-
53
8
:
Applied Cryptography



Location:

ECC 116


D
ay
:
M
W

Semester
: Spring, 2013

Time
: 3
: 00
-

4
:
1
5

Professor
:
Dr. Amos Olagunju


e
-
mail
:
aoolagunju@stcloudstate.edu

Office

Hrs:
11
-
2 M, W
Phone: 308
-
5696







Prerequisites:

CNA 426, MATH 221, 273
.





Description:

Cryptography in secure communications. Secret and Public Key methods.
Management of cryptography technology and its relationship to system security policy.
Legal and social implications.

Objectives:

1.

D
iscuss
design principles und
erlying
conventional
ciphers.



2.

Identify and use symmetric and asymmetric ciphers.


3.

Discuss public
-
key encryption algorithms and de
s
ign principles. Examine the use of
message authentication codes, hash functions, digital signatures and public
-
key
certific
ates.


4.

Discuss
applications of codes in computer
secur
ity
.


5.

Discuss applications of Advanced Encryption Standard.


6.

Examine system

security policy
, legal and social implications of cryptography
technology.


Text
:
Intro to Cryptography with Coding Theor
y, 2
nd

Ed; Wade Trappe and L. C.
Washington
; Prentice Hall 200
6
.

ISBN 0
-
13
-
186239
-
1


Attendance
:

Attendance to every class is
required!

In case of an absence, it is the
responsibility of any student to make up work and get notes from other students. If t
he
student must miss a scheduled test, it is imperative that s/he calls or e
-
mail me as soon as
possible
before

the test. Acceptable excuses would include
written documents of
medical
emergencies.


Academic Dishonesty:

Plagiarism and cheating are serious

violations of St. Cloud State
University’s policy and will not be tolerated. Cheating on a test, an exam or assignment
will result in receiving a zero for the entire test, exam or assignment and can lead to
expulsion from the class or the University.


Tes
ts
:

There will be 2 tests. Each test will last
about 5
0 minutes.



2

Grading
:

Grades will be distributed on a 5% scale (100% to 95% for an A+, 90% to 94% for an A, 89% to
85% for a B+, 80% to 84% for a B, etc) and will be compiled from:


Tests (
2
0%)
;
Supervise
d In
-
class Exercises (
2
0%);
Assignments (20
%);
A
F
inal
E
xam
(2
0%)
;
A Term
Project (
2
0
%)



Assistance
:
Study groups among the students are useful in reinforcing concepts. The best way to keep
from falling behind the teacher is to stay one step ahead! Study

the chapter(s) that will be covered before
each class.


Schedule
:

This is a tentative schedule for this class. If it is necessary to change the schedule, students will
be given as much advance notice as possible. Students are expected to have already r
ead the assigned
chapters before the class and to come to class prepared.


Course Outline

Week

Topics

Chapter

Reading

Specific Subtopics



1

Overview & Applications of
Cryptography

1

Secured Communications; Cryptographic
Applications


2

Classical Crypt
osystems

2

Shift, Affine, Vigenere, Block, Substitution
and Permutation Ciphers


3

Basic Number Theory

3

Modular Arithmetic; CRT; Finite Fields


4

Data Encryption Standard


4

DES Algorithm; Breaking DES; Password
security; Meet
-
in
-
the
-
middle Attacks


5

Advanced Encryption
Standard

5

Rijndael AES Algorithm; Decryption; Design
Considerations


6

RSA Algorithm

6

RSA Application, Challenge and Attacks


7

Discrete Logarithms

7

Discrete Log Computation; D
-
H key
Exchange; ElGamal PK Cryptosystem


8

Mid
-
Term




9

Hash Functions

8

Examples; Secure Hash Algorithm


10

Digital Signatures

9

RSA; ElGamal
; DS Algorithm, Attacks and
Applications


11

Security Protocols

10

Key Distribution; Kerberos; PKI; X.509
certificates; PGP; SSL&TLS; SET


12

Digital Cash, Secret

Sharing
Schemes, Games

11
-
14

Digital Cash; Secret Splitting; Threshold
Schemes;

Flipping coins and Poker over
Phones; Zero
-
Knowledge Techniques



13

Issues in Cryptography

Handouts



14

Project Presentations




NOTE
:
The above schedules and procedures
for this course are subject to change in the event of
extenuating circumstances.


Appendix

The following items as found in NSTISSI 4011, dated 20 June 1994 are specifically covered in this class.


See
http://www.cnss.gov/Assets/pdf/nstissi_4011.pdf

for details.
Although not explicitly listed as topics or
specific subtopics, the following
terms and concepts

are covered in depth via design, implementation and
evaluation of alternative cryptogra
phic algorithms

and systems
.



Crypto
-
variable or key



Encryption and decryption method or procedure or algorithm




Electronic key management system



Security of electronic digital cash system