In this age of Internet computing, there is indeed no place or time at which security does not matter. Protecting vital data from various attacks is always an important part in data systems. This course covers advanced topics in protecting computer systems and information data from various attacks. It covers crypo-algorithms, protocols and system design principles.
Prerequisites: CSC 5270, or the instructor's permission.
For those students who are interested in taking this course, you are welcome to take a look at the course syllabus .
Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone , Handbook of Applied Cryptography , CRC Press, 4th Printing, 1999.
Bruce Schneier, Applied Cryptography , Second Edition, John Wiley & Sons, 1996.
William Stallings, Cryptography and Network Security: Principles and Practice , 4rd Edition, Prentice-Hall, 2005