Math 690 Fall 1999, MW 9:30-11 DRL 4E9

Mathematical Foundations of Computer Security

Professor Andre Scedrov


Office: Room 4E6 in David Rittenhouse Laboratory
Telephone: eight five nine eight three ( Math. Dept. Office: eight eight one seven eight )
Fax: three four zero six three
E-mail: lastname at math
Office Hours: By appointment


Textbooks


About This Course

"What is to distinguish a digital dollar when it is as easily reproducible as the spoken word? How do we converse privately when every syllable is bounced off a satellite and smeared over an entire continent? How should a bank know that it really is Bill Gates requesting from his laptop in Fiji a transfer of $100,000,.....,000 to another bank? Fortunately, the mathematics of cryptography can help. Cryptography provides techniques for keeping information secret, for determining that information has not been tampered with, and for determing who authored pieces of information." (From the Foreword by R. Rivest to the "Handbook of Applied Cryptography" by Menezes, van Oorschot, and Vanstone.)


Topics

Overview of Cryptography, Mathematical Background, Number-Theoretic Reference Problems, Public-Key Parameters, Pseudorandom Numbers and Sequences, Public-Key Encryption, Hash Functions and Data Integrity, Identification and Entity Authentication, Digital Signatures, Key Establishment and Other Security Protocols, Formal Automated Analysis of Security Protocols, Key Management Techniques, Quantum Cryptography.


Further References


In the news ...


Topics Covered So Far


Take-Home Midterm Due in Class Monday, November 1

This is a complete list of assignments due November 1.


Take-Home Final Exam Due in DRL 4E6 Wednesday, December 15 at 4 p.m.

This is a complete list of assignments due December 15.