ECE 8372 / CS 8352 Cryptography & Data Security - Spring 2020

Cryptography is the study of mathematical systems for solving two kinds of security problems on public channels: privacy and authentication. Covers the theory and practice of both classical and modern cryptographic systems. The fundamental issues involved in the analysis and design of a modern cryptographic system will be identified or studied. Prerequisite: EE/STAT/CSE 4340 or equivalent.

Course Handouts [PDF format]

Course Syllabus Textbook Sending a Scanned PDF Copy
Term Paper/Project SMU Computer Accounts Executive Summary
Oral Presentation Time Slots Oral Presentation Rubrics  
H01 - Single User Cryptographic Systems H02 - Vernam Cipher System H03 - Convexity
H04 - Geometric PMF H05 - Register Exchange Problem H06 - Deterministic Turing Machine
H07 - Modern Number Theory H08 - Cayley Table for Elliptic Curves  

Homework Assignments [PDF format]

Homework #01 Homework #02 Homework #03 Homework #04
Homework #05 Homework #06 Homework #07 Homework #08
Homework #09 Homework #10    

Homework Solutions [PDF format]

Homework #01 Homework #02 Homework #03 Homework #04
Homework #05 Homework #06 Homework #07 Homework #08
Homework #09 Homework #10    

Topics [PDF format]

Topic #01 - Classical Cryptographic Systems Topic #02 - Breaking Classicial Systems
Topic #03 - Shannon Theory of Cryptography Topic #04 - Questionnaries and Passwords
Topic #05 - Modern Algebra Topics Topic #06 - DES Operation & Modes
Topic #07 - AES Operation Topic #08 - Attacks on DES & AES
Topic #09 - Computational Complexity & Turing Machines Topic #10 - Modern Number Theory Topics
Topic #11 - Public Key Cryptography & RSA Topic #12 - Discrete Logarithms & DHKE
Topic #13 - Hash Functions & Algorithms Topic #14 - Elliptic Curves
Topic #15 - Elliptic Curves - Issues Topic #16 - Elliptic Curves Cryptography
Topic #17 - Examples  

NIST Documents [PDF format]

FIPS 46 - DES FIPS 46-3 FIPS 81 - Modes FIPS 81-1 Change 2
FIPS 81-1 Change 3 FIPS 197 - AES FIPS 180-1 FIPS 180-2
FIPS 180-3 FIPS 180-4 FIPS 186-4 NIST SP 800 Series
NIST SP 800-57 Part 1 Rev 4 NIST SP 800-57 Part 2 Rev 1 NIST SP 800-57 Part 3 Rev 1 NIST SP 800-57 Part 1 Rev 5 Draft
NIST SP 800-131A Rev 2 (Key Lengths) NIST Cryptographic Toolkit Post-Quantum Cryptography (PQC)  

Course Examples [PDF format]

Example 01 Example 02    

Supplements [PDF format]

Topic 02 - Frequency Analysis Sheet Topic 02 - High Frequency Letter Analysis Sheet    

Course Downloads [ZIP format]

ee8372.bc      

Information Resources

Publication: Information for Authors Links

  1. IEEE Publications. Information about IEEE Publications.
  2. IEEE Transactions, Journals, and Letters Information for Authors. IEEE information for author and submission guidelines.
  3. Submitting Articles to ACM Journals. ACM information for authors.

Available Books

  1. Alan G. Konheim, Cryptography, a Primer. New York: Wiley, c1981
  2. Wenbo Mao, Modern Cryptography: Theory and Practice. New Jersey: Prentice Hall Professional Technical Reference, c2004
  3. Douglas R. Stinson, Cryptography: Theory and Practice, 3rd Edition. CRC Press, Inc., c2006
  4. Henk C. A. van Tilborg, An Introduction to Cryptography. Boston, Kluwer, c1988
  5. Dominic Welsh, Codes and Cryptography. New York: Oxford University Press, c1988