In this age of Internet computing, there is indeed no place or time at which security does not matter. Protecting vital data from various attacks is always an important part in data systems. This course covers basic topics in protecting computer systems and information data from various attacks. It covers crypo-algorithms, protocols and system design principles, as well as case study.
Prerequisites: CSC 4420 and CSC 5250, or the instructor's permission.
For those students who are interested in taking this course, you are welcome to take a look at the course syllabus .
William Stallings, Cryptography and Network Security: Principles and Practice , 6th Edition, Pearson, 2014
Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone , Handbook of Applied Cryptography , CRC Press, 4th Printing, 1999.
Bruce Schneier, Applied Cryptography , Second Edition, John Wiley & Sons, 1996.
Collaboration in terms of discussions is generally allowed and encouraged in the homeworks. But you should write the final solutions, including programs, alone, and understand them fully. It is absolutely not allowed to copy other people's soltuions and programs.
Late homeworks lose 20% of their scores per day (except in cases of illness or emergency), and will not be accepted 3 days after the due date.