This course investigates both classical and modern methods for information security.
Topics will include classical alphabetic cryptographic and decryption techniques,
RSA, private and public key encryption, visual cryptography, and data privacy.
CSC 234 or permission of instructor.
Quizzes and Participation
You are encouraged to attend class and participate in discussions.
Active participation in class discussions and short quizzes will
comprise 5% of your final grade.
Centenary assures students with disabilities equal opportunity to reach the same level of
achievement as other students. Strict confidentiality will be maintained on students with
disabilities. Services for students with disabilities are available through the Counseling
Center, located on the ground floor of Rotary Residence Hall, phone (318) 869-5424.
All students are bound by the Honor System. The Honor System is applicable to all academic
work. See the Centenary College Handbook
for the complete Honor Code
Extensions for for labs, projects, exams and quizzes are only given when
circumstances beyond your control (e.g. being sick, choir or sports travel)
prevent you from completing a project on time. You must notify me either by
email or phone of your circumstances well in advance of the due date.
We will be covering pieces of the textbook, Chapters 1-6, 9-10, 12 with presentations covering
We will also be using additional supplemental material such as relevant web-pages
and background material.
Readings will be assigned before material will be covered in class. You are expected
to review the material and come to class prepared. As readings are assigned,
they will be posted
- Chapter 1 - What is Security, Steganography?
- Chapter 2 - Mathematics of Modular Integer Sets
- Chapter 3 - Substitution Ciphers
- Chapter 3 - Transposition Ciphers
- Chapter 4 - Algebraic Structures
- Chapter 5 - Elements of Modern Ciphers
- Chapter 6 - Data Encryption Standard
- Appendix O - Simple DES
- Chapter 7 - Advanced Encryption Standard
- Appendix P - Simple AES
You will have weekly Homeworks in this course, for a total of
35% of your final grade. These homeworks will cover concepts we have
discussed in class, and will be due approximately one week
after they are assigned.
You may work with a partner on these homeworks.
You may discuss concepts and ideas with your classmates, but the code you turn in
must be your own or written only with your partner. You will be graded not only on correctness, but also technique,
documentation and evaluation
of your solution. Further details on the grading standards
for each project will be given when they are assigned.
You will give two class presentations. The first will be a 10 minute presentation on
a particular hacking incident or security. This will be presented on September 15th.
The second presentation will be a 30 minute presentation on a security protocol, chosen from
Chapters 11 - 18. The project must involve a literature search for relevant articles.
Your presentation should have roughly the following format, be sure to include figures and diagrams:
- Historical Background
- What issue of security does this address
- Core System/Algorithm
- Worked Example
- Conclusions and References
The purpose of this project is to improve your research and writing
skills as well as give you an opportunity to explore in-depth a particular area of
cryptology and security. You will gain a grasp of the state-of-the-art Security research in
your particular topic and share this with the rest of the class through a web-page. More
details of this project as the semester progresses.
There will be two exams (midterm and final), each worth 15% of your final grade.
- Midterm: Due Sep 29
- Final: Dec Exam Week
Your final grade for this course will be based on the Homework, Project, Exams and
Participation described above.
© Mark Goadrich, Centenary College of Louisiana