CSCI284 Spring 2004 GWU http://www.seas.gwu.edu/~poorvi/Classes/CS284/ Introduction CSCI284 Spring 2004 GWU http://www.seas.gwu.edu/~poorvi/Classes/CS284/
What we hope to learn Algorithms that form the basis of classical and modern cryptography – their strengths and weaknesses The mathematical principles behind the strengths and weaknesses Mathematical exposition: i.e. writing clearly and unequivocally why something is true Programming for cryptography 5/25/2019 CS284/Spring04/GWU/Vora
Student Evaluations Course grades will be based on HWs (75%) Project (25%) You may collaborate on HW solution, but not on the writing of the HW. If two HWs are found to be substantially similar, both students could be held liable for academic integrity violations HWs are due by the end of the day, Wed., nine days after they are assigned, by e-mail to the instructor: poorvi@gwu.edu You may lose marks for disruptive behaviour in class. 5/25/2019 CS284/Spring04/GWU/Vora
What we will not learn Operating system and program security Network security Viruses and firewalls Advanced methods for breaking cryptographic primitives Hardware implementation of crypto 5/25/2019 CS284/Spring04/GWU/Vora
Texts and References The required test is listed on the website, and will be used to assign homework from: Douglas Stinson, "Cryptography: Theory and Practice", Second Edition, 2002 Other references will be used, most will be provided in electronic or paper form. 5/25/2019 CS284/Spring04/GWU/Vora
Contacting the instructor Office: 706, Philips Hall, Academic Centre Email: poorvi@gwu.edu Office Hours: Mon, Wed: 3-5 pm. 5/25/2019 CS284/Spring04/GWU/Vora