CSCI 3381 Cryptography (Spring: 3 )
Can Alice ensure that the message she sends to Bob can be read only by Bob, even if the message is intercepted by an eavesdropper? Can Bob ensure that the message he receives really came from Alice? How can a server verify a client's password without storing sensitive password information? This course studies both the theoretical foundations and implementation of algorithms for private and public key cryptography, digital signatures, cryptographic hash-codes, and authentication schemes. We will consider real world protocols and practices (e.g., SSL and public key certificates) as well as more speculative protocols and methods (electronic elections, quantum cryptography).
Instructor(s): Howard Straubing
Last Updated: 21-Feb-17