This course aims to give students an overview of cryptographic concepts and methods, a good knowledge of some commonly used cryptographic primitives and protocols, a sound understanding of theory and implementation, as well as limitations and vulnerabilities, and an appreciation of the engineering difficulties involved in employing cryptographic tools to build secure systems. Some programming required.
Section Comments: Cross listed with COMP 785. Graduate Coordinator permission required.
Registration Approval Required. Contact Instructor or Academic Department for permission then register through Webcat.