COURSE SECTION INFORMATION
School of Advanced Technology
Out of Class
Section Specific Learning Resources
Cryptography Decrypted, H. X. Mel and Doris Baker, Addison Wesley Pearson
Cryptography and Network Security: Principles and Practice, by William Stallings, 4th ed.,
Prentice Hall, ISBN 0
Handouts given in class, recommeded white papers
, sections of manuals of equipment
manufacturers, Safari database, web links suggested by
Students are required to have a caddy with a 20 GB hard disk and Windows 2000 Pro installed
on the drive.
Use of online calculator fr
om Windows CP/7 or Linux.
Additional material relevant to the course, in the form of electronic documents eg. Web links,
will be provided by the course professor. Students are required to refer to the material.
from Cisco’s manu
al for DH key exchange.
Describe cryptographic concepts and terms.
Types of attack. Exhaustive key search, appreciation.
diagram, trigram. Class exercise on Vigenere’s cipher. Introduction to steganography.
Setup Cryptool, complete lab on hashing, ECB, CBC mode
Select topic for term project. Review submission stand
ards and marking rubric.
Review questions for Part 1
, detailed syllabus.
Read chapter 1. Answer questions on chapter 1 from Part 1 of
DES, Class Exercise on Feistel model.
Define confusion, di
avalanche effect. Substitution and permutation. DES inte
rnals, key generation, S boxes.
Differential and linear cryptanalysis.
Complete chapter 2.
Demonstrate lab 1 to instructor.
Use Crypto API and find entropy.
Introduction to 3DES.
AES Evaluation criteria. Power attack.
API’s, encrypt given text and determine entropy.
Abstract for term project, worth 5 marks.
Get abstract approved. Determine
Introduce instruction level parallelism.
on Chapter 1,2,3. Quiz 3%
2 DES, 3DES
. Modes. ECB, CBC, OFB, CFB, Counter
Hash and One Time Pad
Complete Chapter 6.
CISSP Video by
Debrief and discussion on
Test 1, 10%
Link encryption and End to end encryption. Traffic confidentiality. Key
distribution. Random numbers, PRNG and key stream generators.
Thunderbird, GPG plugin.
Introduction to Number theory. Class exercise on Asymmetrical Key.
Compare symmetrical and asymmetrical methods.
, DH key exchange. Term project document due. Slides
(optional) due. Note: Document is mandatory, slides are o
entations on term project begin
Digital Signature, PGP, Digital Certificates. Chapter 15.
Review. Questions on Part IV.
Test 2, 10%
Term Presentations, c
labs, lab demonstrations.
. Complete any lecture material.
Complete labs. Ensure all lab marks are updated on Bb.
Final Assessment (
Assessment of student learning will be done by means of two class tests, quizzes,
laboratory assignments, group assignment and presentation.
Laboratory attendance is compulsory, and absence from three or more laboratory sessions
without the prior consent of the professor will result in a final grade of “F”. Students are
onsible for keeping a record of the number of laboratory sessions
they have missed.
Professors will not inform students of an impending failure because of missed laboratory
All laboratory assignments must be successfully completed in order t
o obtain course credit. Late
assignments will be penalized and receive a mark of zero, but they must still be completed. Any
missed evaluation points will result in a grade of “0”. In the case of a documented emergency the
professor, in consultation with t
he Chair, will determine how the marks will be made up and/or
final grade adjusted.
The Computer Studies Department requires that all course assignments (homework exercises,
laboratory work, projects, etc) be submitted by students using a standard which co
uld be specific
to one or more courses.