It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.

This Course Guide helps you identify some of the resources available at Mohammed VI Library. For more information please get in touch with Your Librarian whose contact information is listed below right.

**Please use the vocabulary list below to search the library catalog, through the keyword function, to identify materials relevant to this course.**

- Cryptography
- Cryptography mathematics
- Cryptography -- Congresses
- Data protection
- Data protection -- Congresses
- Coding theory
- Computer security
- Computers -- Access control
- Computers -- Data Processing
- Authentication protocols
- PKI -- Cryptography
- Secret Key encryption
- Public Key encryption
- Stream ciphers
- ...

**Textbooks:**

- Cryptography and Network Security, by William Stallings, Printice Hall International Edition, 4d edition. http://williamstallings.com/Crypto/Crypto4e.html
- An Introduction to Mathematical Cryptography, by Jeffery Hoffstein et al., Springer, ISBN: 978-0-387-77993-5 e-ISBN: 978-0-387-77994-2 DOI: 10.1007/978-0-387-77994-2

**References:****R1:** Standard Selection process: http://en.wikipedia.org/wiki/Advanced_Encryption_Standard_process**R2:** FIPS: http://csrc.nist.gov/publications/fips/**R3:** Hardware implementation of AES: http://cegt201.bradley.edu/projects/proj2005/aes128/2**R4:** http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation**R5:** Weak Keys: http://en.wikipedia.org/wiki/Weak_key

"This course aims at introducing students to modern cryptography as a major tool in Computer and Information security.

Topics will include:

- Block and stream ciphers,
- secret key encryption (3DES, AES, RC-n),
- Public key encryption (RSA, Diffie-Hellman,
- Elliptic curve cryptography),
- Key management,
- hash and message authentication functions (MD5, SHA-1, CMAC , HMAC),
- digital signatures,
- PKI,
- Authentication protocols.

The necessary number theory such as** primes**, **random numbers**, **factoring**,** discrete logarithms,** **finite fields** and** elliptic curve mathematics** will be also covered in class.

When appropriate, cryptanalysis of the various techniques, such as known/chosen plaintext, linear and differential cryptanalysis and some side channel analyses will also be covered."

**Please use the call number below to search the library catalog, through the Call Number function, to browse the library collection listing materials relevant to this course.**

***Q -- Science**

** QA -- Mathematics**

** QA75.5~76.95 -- Electronic computers. Computer science**