CS 668A Foundations of Cryptography
CS/CpE 668A Foundations of Cryptography
Prof. Rebecca Wright
[Note: This class was previously called CyberSecurity Techniques and
Mechanisms, and has also been listed by CpE as Computer &
Telecomm Security. Foundations of Cryptography is a more
accurate name than either of these.]
This course provides a broad introduction to cornerstones of security
(authenticity, confidentiality, message integrity, and
non-repudiation) and the mechanisms to achieve them, as well as the
underlying mathematical basics. Topics include: block and stream
ciphers, public-key systems, key management, certificates, public-key
infrastructure (PKI), digital signatures, non-repudiation, and message
authentication. Various security standards and protocols such as DES,
AES, PGP, and Kerberos, are studied.
Prerequisites: MA 502 (Mathematical Foundations of Computer Science)
and CS 590 (Introduction to Data Structures and Algorithms), or
permission of the instructor.
Douglas Stinson, Cryptography: Theory and Practice , second
edition, CRC Press. (Required). A list of
errata is also available on-line.
Alfred Menezes, Paul van Oorschot, and Scott Vanstone, Handbook of
Applied Cryptography , CRC Press. (Optional). I think you will
find this a useful supplement to the main text. It is accessible on
the web, at
You can also find useful background on computational aspects of number
theory and algebra on-line, in A
Computational Introduction to Number Theory and Algebra by Victor
The syllabus for this course: ps | pdf .
Georgi Babayan, gbabaya1(at)stevens-tech.edu .
Georgi Babayan's office hours are Tuesdays, 4-6pm, and Thursdays,
4:30-6pm, in the Burchard computing lab.
Prof. Wright's office hours are Tuesdays 2-4pm in Lieb 216.
Last updated 10/2/03 by
rwright (at) cs.stevens-tech.edu
Copyright © 2003
Rebecca N. Wright