Skip to main content

Cryptography - CSC3355: Home

This Course Guide helps you identify some of the resources available at Mohammed VI Library. For more information please get in touch with Your Librarian whose contact information is listed below right.

Vocabulary list

Please use the vocabulary list below to search the library catalog, through the keyword function, to identify materials relevant to this course.

  • Cryptography
  • Cryptography mathematics
  • Cryptography -- Congresses
  • Data protection
  • Data protection -- Congresses
  • Coding theory
  • Computer security
  • Computers -- Access control
  • Computers -- Data Processing
  • Authentication protocols
  • PKI -- Cryptography
  • Secret Key encryption
  • Public Key encryption
  • Stream ciphers
  • ...

 

Textbooks/References

Textbooks:

  •  Cryptography and Network Security, by William Stallings, Printice Hall International Edition, 4d edition. http://williamstallings.com/Crypto/Crypto4e.html
  •  An Introduction to Mathematical Cryptography, by Jeffery Hoffstein et al., Springer, ISBN: 978-0-387-77993-5 e-ISBN: 978-0-387-77994-2 DOI: 10.1007/978-0-387-77994-2

References:
R1: Standard Selection process: http://en.wikipedia.org/wiki/Advanced_Encryption_Standard_process
R2: FIPS: http://csrc.nist.gov/publications/fips/
R3: Hardware implementation of AES: http://cegt201.bradley.edu/projects/proj2005/aes128/2
R4: http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation
R5: Weak Keys: http://en.wikipedia.org/wiki/Weak_key

Introduction

"This course aims at introducing students to modern cryptography as a major tool in Computer and Information security.

Topics will include:

  • Block and stream ciphers,
  • secret key encryption (3DES, AES, RC-n),
  • Public key encryption (RSA, Diffie-Hellman,
  • Elliptic curve cryptography),
  • Key management,
  • hash and message authentication functions (MD5, SHA-1, CMAC , HMAC),
  • digital signatures,
  • PKI,
  •  Authentication protocols.

The necessary number theory such as primes, random numbers, factoring, discrete logarithms, finite fields and elliptic curve mathematics will be also covered in class.

When appropriate, cryptanalysis of the various techniques, such as known/chosen plaintext, linear and differential cryptanalysis and some side channel analyses will also be covered."

Library of Congress Classes and Subclasses

Please use the call number below to search the library catalog, through the Call Number function, to browse the library collection listing materials relevant to this course.

*Q -- Science

    QA -- Mathematics

      QA75.5~76.95 -- Electronic computers. Computer science

Subject Guide

Asmae Zaidane