CS 378 Introduction to Cryptology

University of Kentucky
Department of Computer Science
CS 378 Introduction to Cryptology
 
 
1.  Course Number/Name:  CS 378 Introduction to Cryptology
 
2.  Credits and Contact Hours:  3 credits, 3 contact hours
 
3.   Instructor:  assigned by department
 
4.   Textbook:  Introduction to Cryptography with Coding Theory, second edition, by Wade Trappe, Lawrence Washington.
                         Publisher: Prentice Hall. 
 
5.   a.  Catalog Description: The study of privacy in digital systems. Methods of keeping information secure from classical
           systems dating from ancient times to modern systems based on modern mathematics. Basic methods of encryption using
           public key systems, block ciphers, and stream ciphers. The mathematical tools for the design and analysis of such systems.
           Topics will include classical cryptography, modern methods of public and private key encryption, authentication and digital
           signatures, hashing, and passwords. Number theory, abstract algebra, combinatorics, and complexity theory necessary for
           the design and analysis of cryptographic systems.

b.  Prerequisites:  CS 315, STA 281, or instructor's consent
 
c.    Elective course   
 
6.  a.   Outcomes of InstructionAt the conclusion of CS 378 the student should:

1.   Know basic issues of security in communication and computing.
2.   Know basic approaches to solving security problems.
3.   Know mathematical tools for analyzing cryptographic protocols, including the basic number theory.
4.   Be familiar  with a variety of protocols for providing security in digital systems.
5.   Experience implementing security protocols.
b.   Contributions to Student Outcomes from Criterion 3
           

Outcome

a

b

c

d

e

f

g

h

i

j

k

CS 378

3

 

2

 

2

 

 

 

2

3

 

3- Strongly supported   2 – Supported   1 – Minimally supported
 
 7.   List of Topics Covered:

1.    Classical cryptosystems
2.    Mathematical tools
3.    Block ciphers
4.    Public key cryptosystems
5.    Authentication
6.    Cryptographic protocols
7.    Other topics