Math 690 Fall 2006, MW 10:30-12

Mathematical Foundations of Computer Security

Professor Andre Scedrov


Office: Room 4E6 in David Rittenhouse Laboratory
Telephone: eight five nine eight three ( Math. Dept. Office: eight eight one seven eight )
Fax: three four zero six three
E-mail: lastname at math
Office Hours: By appointment


About This Course

"What is to distinguish a digital dollar when it is as easily reproducible as the spoken word? How do we converse privately when every syllable is bounced off a satellite and smeared over an entire continent? How should a bank know that it really is Bill Gates requesting from his laptop in Fiji a transfer of $100,000,.....,000 to another bank? Fortunately, the mathematics of cryptography can help. Cryptography provides techniques for keeping information secret, for determining that information has not been tampered with, and for determing who authored pieces of information." (From the Foreword by R. Rivest to the "Handbook of Applied Cryptography" by Menezes, van Oorschot, and Vanstone.)

This course for graduate students and advanced undergraduates will discuss security protocol design and analysis and the related areas of cryptography.


Textbook


Further References


Homework #1 Due in Class on Monday, October 2

This is the complete set of problems for Homework #1 due in class on Monday, October 2.

Take-Home Midterm Due in Class on Wednesday, November 8

This is the complete set of problems for take-home midterm due in class on Wednesday, November 8.

Take-Home Final Exam Due in DRL 4E6 on Wednesday, December 20 at 10 a.m.

This is the complete set of problems for take-home final exam due in DRL 4E6 on Wednesday, December 20 at 10 a.m.