University of Wisconsin Madison Introduction to Cryptography (E C E 435) Syllabus Course Learning Outcomes Course Learning Outcome 1 Students will be able to implement classical cryptosystems (including shift, substitution, and Vigenere ciphers). 2 Students will be able to break classical cryptosystems under chosen-plaintext, known-plaintext, and ciphertext-only attacks. 3 Students will be able to describe modern-day private-key and public-key cryptosystems. Details Introduction to Cryptography E C E 435 ( 3 Credits ) Description Cryptography is the art and science of transmitting digital information in a secure manner. This course will provide an introduction to its technical aspects. Prerequisite(s) Math 320 or 340 or cons inst. Open to Fr Department: ELECTRICAL AND COMPUTER ENGR College: College of Engineering Instructor Instructor Name Instructor Campus Address instructorEmail@emailaddress.edu Contact Hours 2.5 Course Coordinator NIGEL BOSTON Text book, title, author, and year Introduction to Modern Cryptography: Principles and Protocols; Jonathan Katz; 2007; 2007 Supplemental Materials None Required / Elective / Selected Elective Selected Elective ABET Program Outcomes Associated with this Course 1 A An ability to apply knowledge of mathematics, science, and engineering 2 B An ability to design and conduct experiments, as well as to analyze and interpret data 3 D An ability to function on multidisciplinary teams 4 H The broad education necessary to understand the impact of engineering solutions in a global, economic, environmental, and societal context 5 J A knowledge of contemporary issues 6 K An ability to use the techniques, skills, and modern engineering tools necessary for engineering practice Program Specific Student Outcomes Brief List of Topics to be Covered Classical cryptography: substitution ciphers, polyalphabetic methods, etc. Introduction to cryptanalysis: frequency counts, coincidence index, Shannon's theory, Block ciphers (DES, AES, etc.) Public-key cryptography (modular arithmetic, systems based on factoring and discrete logarithms) Cryptographic protocols (key exchange methods, digital signatures, secret sharing, authentication) Additional Information Printed: Oct 23, 2017 6:48:47 AM Generated by AEFIS. Developed by AEFIS, LLC Copyright © University of Wisconsin Madison 2017. All rights reserved.