Instructor: Modhi
Contact Info.
email: cs.course.at.tu@gmail.com
twitter: https://twitter.com/cs_course_at_tu
office hours: as posted on the office- room331
PLEASE! Allow 48 hours before following up!
Check out the video for a simple big picture!
Spongebob and Patrick are sending bubble messages to each other, but Squidward is hijacking the bubble to ruin their messages.
The bubble works as a cryptonium pipe that hides the private conversation between Spongebob and Patrick.
0. Course info + Intro
Reading: Chapter 1
2. Classical Encryption Techniques
Reading: Chapter 3
Reading: Chapter 4
S-DES: Reading
4. Block Cipher Operations
Reading: Chapter 7
5. Advanced Encryption Standard
Reading : Chapter 6
6. Basic Concepts in Number Theory
Reading: Chapter 2 and 5
Reading: Chapter 8
8. Public Key Encryption and RSA
Reading: Chapter 9
9. Diffie-Hellman Key Exchange
Reading: Chapter 10
10. Cryptographic Hash Functions
Reading: Chapter 11
11. Digital Signature and Key Distribution
Reading: Chapters 13 & 14
Cryptography and Network Security: Principles and Practice
Your presentation should make colleagues care about the subject and understand the main ideas of the topic. It should be informative and clear.
Your grade will be determined by the quality of the presentation and your ability to answer questions about the subject.
You will present according to this schedule.
We will use this evaluation Form.
Try this!
Any image editor program, e.g., Paint
Command prompt
Coagula for Windows