CSC 450 - Cryptology and Security

Centenary College of Louisiana
Wright Building Fishbowl Lab 105
TR 12:35-1:50 - Fall 2011

Instructor: Dr. Mark Goadrich

Contact Info
104 Wright Building
(318) 869-5194

Office Hours
MW 10:00-12:00
TR 10:00-11:00
or by appointment

Overview | Syllabus | Labs | Projects | Exams | Grading

Course Details


Cryptography and Network Security
by Behrouz A. Forouzan, 2008
De Anza College
ISBN: 978-0073327532
Find this book at Amazon


This course investigates both classical and modern methods for information security. Topics will include classical alphabetic cryptographic and decryption techniques, RSA, private and public key encryption, visual cryptography, and data privacy.


CSC 234 or permission of instructor.

Quizzes and Participation

You are encouraged to attend class and participate in discussions. Active participation in class discussions and short quizzes will comprise 5% of your final grade.


Centenary assures students with disabilities equal opportunity to reach the same level of achievement as other students. Strict confidentiality will be maintained on students with disabilities. Services for students with disabilities are available through the Counseling Center, located on the ground floor of Rotary Residence Hall, phone (318) 869-5424.

Honor Code

All students are bound by the Honor System. The Honor System is applicable to all academic work. See the Centenary College Handbook for the complete Honor Code.


Extensions for for labs, projects, exams and quizzes are only given when circumstances beyond your control (e.g. being sick, choir or sports travel) prevent you from completing a project on time. You must notify me either by email or phone of your circumstances well in advance of the due date.


We will be covering pieces of the textbook, Chapters 1-6, 9-10, 12 with presentations covering Chapters 11-18. We will also be using additional supplemental material such as relevant web-pages and background material. Readings will be assigned before material will be covered in class. You are expected to review the material and come to class prepared. As readings are assigned, they will be posted here.


You will have weekly Homeworks in this course, for a total of 35% of your final grade. These homeworks will cover concepts we have discussed in class, and will be due approximately one week after they are assigned.

You may work with a partner on these homeworks. You may discuss concepts and ideas with your classmates, but the code you turn in must be your own or written only with your partner. You will be graded not only on correctness, but also technique, documentation and evaluation of your solution. Further details on the grading standards for each project will be given when they are assigned.


You will give two class presentations. The first will be a 10 minute presentation on a particular hacking incident or security. This will be presented on September 15th.

The second presentation will be a 30 minute presentation on a security protocol, chosen from Chapters 11 - 18. The project must involve a literature search for relevant articles.


Your presentation should have roughly the following format, be sure to include figures and diagrams:


The purpose of this project is to improve your research and writing skills as well as give you an opportunity to explore in-depth a particular area of cryptology and security. You will gain a grasp of the state-of-the-art Security research in your particular topic and share this with the rest of the class through a web-page. More details of this project as the semester progresses.


There will be two exams (midterm and final), each worth 15% of your final grade.


Your final grade for this course will be based on the Homework, Project, Exams and Participation described above.
Grading Scale

© Mark Goadrich, Centenary College of Louisiana