What's New
- Aug 25: First day of class. This web-page will be your
main source of information about this
class. Plan to check this page regularly.
- Sep 8: There will be no class on Thursday, Sep 11th.
Course Details
Textbook
Overview
This course investigates both classical and modern methods for information security.
Topics will include classical alphabetic cryptographic and decryption techniques,
RSA, private and public key encryption, visual cryptography, and data privacy.
Prerequisites
CSC 234 or permission of instructor.
Quizzes and Participation
You are encouraged to attend class and participate in discussions.
Active participation in class discussions and short quizzes will
comprise 5% of your final grade.
Extra Credit
Extra credit for this course can be earned by participating in the
Centenary Math Problem of the Week (POTW). Each reasonable submission will be worth an
additional 0.5% toward your final grade, CC me with your submission for credit.
Disabilities
Centenary assures students with disabilities equal opportunity to reach the same level of
achievement as other students. Strict confidentiality will be maintained on students with
disabilities. Services for students with disabilities are available through the Counseling
Center, located on the ground floor of Rotary Residence Hall, phone (318) 869-5424.
Honor Code
All students are bound by the Honor System. The Honor System is applicable to all academic
work. See the
Centenary College Handbook
for the complete
Honor Code.
Extensions
Each day an assignment is late, you will lose 10% of the credit for that assignment.
No late work will be accepted after 5 days past the due date. This is an actual
day, not a class day. You will have 2 free late days, to be used at your discretion
throughout the semester. If you are turning in an assignment late, you need to email
me with how many free late days you plan to use.
Extensions beyond this for labs, projects, exams and quizzes are only given when
circumstances beyond your control (e.g. being sick, choir or sports travel)
prevent you from completing a project on time. You must notify me either by
email or phone of your circumstances well in advance of the due date.
Syllabus
We will be covering pieces of the textbook, Chapters 1-6, 9-10, with projects covering
Chapter 11-18.
We will also be using additional supplemental material such as relevant web-pages
and background material.
Readings will be assigned before material will be covered in class. You are expected
to review the material and come to class prepared. As readings are assigned,
they will be posted
here.
- Week of August 25th
- Chapter 1 - What is Security, Steganography?
- Week of Sep 1st
- Chapter 2 - Modular Arithmetic
- Week of Sep 8th
- Week of Oct 1st
- Chapter 4 - Algebraic Structures
Code for class and data files can be found here.
I have also posted Lecture Notes for the semester to help
you study for the final.
Homework
You will have weekly Homeworks in this course, for a total of
40% of your final grade. These homeworks will cover concepts we have
discussed in class, and will be due approximately one week
after they are assigned.
You may work with a partner on these homeworks.
You may discuss concepts and ideas with your classmates, but the code you turn in
must be your own or written only with your partner. You will be graded not only on correctness, but also technique,
documentation and evaluation
of your solution. Further details on the grading standards
for each project will be given when they are assigned.
Project
The purpose of this project is to improve your research, writing and communication
skills as well as give you an opportunity to explore in-depth a particular area of
cryptology and security. You will gain a grasp of the state-of-the-art Security research in
your particular topic and share this with the rest of the class through a paper /
web-page and a presentation.
The project will involve:
- a literature search for relevant articles
- a six (6) page report / web-page
- a 15 minute in-class presentation, with 3 - 5 minutes for questions.
Topic Assignments
- WEP/WPA - Bradlee Robertson
- Digital Signatures - Michael Walker
- SSL/TLS - Jeffrey James
- SSH - Nolan Baker
- Twofish - Brent Krise
- MD-5/Birthday attack - Jacob Jennings
- VPN - Justin Bailey
Guidelines
Your 6 page reports should have roughly the following format, be sure to include figures and diagrams:
- Introduction - 1 paragraph/page
- Historical Background - 1 page
- What issue of security does this address - 1 page
- Core System/Algorithm - 2-3 pages
- Worked Example - 1 page
- Strengths/Weaknesses - 1/2 page
- Conclusions and References - 1 page
Exams
There will be two exams (midterm and final), each worth 20% of your final grade.
- Midterm: Due October 14th
- Final: Dec Tuesday 16th 4-7pm Exam Week
Grading
Your final grade for this course will be based on the Homework, Project, Exams and
Participation described above.
Grading Scale |
90-100 | A |
80-89 | B |
70-79 | C |
60-69 | D |
0-59 | F |
|
Weights |
Homework | 40% |
Project | 15% |
Participation | 5% |
Midterm | 20% |
Final | 20% |
|
© Mark Goadrich, Centenary College of Louisiana