Date |
|
Topic |
Slides (.ppt) |
14-Jan |
Stallings, Ch.1 |
Overview |
|
19-Jan |
Stallings, Ch.2 |
Conventional Encryption: Classical
Techniques |
|
26-Jan |
Stallings, Ch.3 |
Conventional Encryption: Modern Techniques |
|
28-Jan |
Stallings, Ch.4 |
Introduction to Finite Fields |
|
2-Feb |
Stallings, Ch.5 |
Conventional Encryption: AES |
|
4-Feb |
Stallings, Ch.6 |
Contemporary Symmetric Ciphers |
|
9-Feb |
Stallings, Ch.7 |
Confidentiality Using Conventional
Encryption |
|
11-Feb |
Stallings, Ch.8 |
Introduction to Number Theory |
|
16-Feb |
|
Exam I
|
|
18-Feb |
(continued) |
|
|
23-Feb |
Stallings, Ch.9 |
Public-Key Cryptography |
|
25-Feb |
|
Preliminary
project presentations |
|
2-Mar |
Stallings, Ch.10 |
Key Management |
|
4-Mar |
Stallings, Ch.11 |
Message Authentication and Hash Functions |
|
9-Mar |
Stallings, Ch.12 |
Hash and Mac Algorithms |
|
11-Mar |
|
|
|
16-Mar |
Exam II
|
|
|
18-Mar |
Stallings, Ch.13 |
Digital Signatures and Authentication
Protocols |
|
23-Mar |
Stallings, Ch.14 |
Authentication Applications |
|
25-Mar |
Stallings, Ch.15 |
Electronic Mail Security |
|
6-Apr |
Stallings, Ch.16 |
IP Security |
|
8-Apr |
|
(Continued) |
|
15-Apr |
Stallings, Ch.17 |
Web Security |
|
20-Apr |
Stallings, Ch.18 |
Intruders, Viruses, and |
|
22-Apr |
|
(Continued) |
|
27-Apr |
Exam III
|
|
|
29-Apr |
Stallings, Ch.19 |
Firewalls |
|
4-May |
Schneier |
Cryptanalysis Methods |
|
6-May |
Schneier,
Web |
Legal and Social Issues - Current
Legislation |
|
11-May |
|
Report Presentations
|
|