The following paragraphs were taken from the Blackboard course information.

Course Description

After completing this 3 credit course, students should have strong mathematical foundations including information theory, number theory, factoring, and prime number generation; Cryptographic protocols including basic building blocks and protocols; Cryptographic techniques including key generation and key management, and applications; Cryptographic algorithms including DES, AES, Stream Ciphers, Hash functions, digital signatures, and more.

Readings

REQUIRED TEXT BOOK

Understanding Cryptography: A Textbook for Students and Practitioners, Authors: Christof Paar and Jan Pelzl

Paar, C. Pelzl, J. (2010). Understanding Cryptography: A Textbook for Students and Practitioners. Springer Heidelberg Dordrecht London New York, 1st edition.

ISBN: 978-3-642-04100-6

Other readings are listed in each module.

General Course Objectives:

Upon successful completion of this course, students will:

More specific objectives for each topic are listed within each module.

How the Course Works

Methods of Delivery/Learning Activities

This online course employs several methods of delivery and learning activities including online lectures and presentations, threaded discussions, Web sites, video clips, reading and written assignments, self-assessment checks, examinations, e-mail, and electronic access of information.