Syllabus - ICS 247 - Computer Security Algorithms
Michael T. Goodrich
http://www.ics.uci.edu/~goodrich/teach/ics247/
(Office hourse by appointment)
- Coursework. Coursework will consist of homeworks,
class presentations, and a course project. The overall grade
will be determined 35% from homeworks, 25% from the midterm,
and 40% from the final exam.
Group work on homeworks is permitted, but each student must
list his or her collaborators in writing for each problem. If a student
turns in a solution without listing the others who helped produce this
solution, this act will be considered cheating (for it is plagarism).
(See the
ICS
Cheating Policy.)
Late homework assignments will not be accepted.
- Text. Pieprzyk, Hardjono, and Seberry,
Fundamentals of Computer Security
- Add/drop policy. All drop requests should be given to
Prof. Goodrich at office hours or by appointment. Drops will be
accepted only up to the fourth week. Once your drop card has been
signed, further coursework from you will not be graded. After the
seventh week of classes, withdrawals will be allowed only by
petition and under documented extenuating circumstances, in
accordance with ICS departmental policy.
Tentative Schedule
- Week 1:
-
Introduction. Elementary cryptography. Subsitution ciphers. One-time pad.
One-way hash functions.
- Week 2:
-
Elementary number theory. The Extended Euclid GCD Algorithm
(for multiplicative inverses).
Modular exponentiation. Finding prime numbers.
-
Week 3:
-
Public-key algorithms. RSA. El Gamal. Digitial Signatures.
-
Week 4:
-
Digital time stamping.
Message Authentication Codes.
Merkle Hash Trees.
-
Week 5:
-
Authenticated Dictionaries.
RSA Accumulators.
Digital certificates. Revocation.
-
Week 6:
-
Broadcast encryption. Logical Key Hierarchy (LKH). One-way
Function Trees. Subset Difference Revocation.
-
Week 7:
-
Threshold cryptography and secret sharing.
Searching in encrypted data.
-
Week 8:
-
Zero-knowledge proofs.
Property testing. Zero-knowledge proofs of knowledge.
-
Week 9:
-
Security protocols and Oblivous transfer. Certified email. Coin flipping.
-
Week 10:
-
Electronic voting and lotteries.
Temporial and Active security.
Copyright © 2004
Michael T. Goodrich, as to all lectures.
Students are prohibited from selling
(or being paid for taking) notes during this course to or by any
person or commercial firm without the express written permission of the
professor teaching this course.