Please use this identifier to cite or link to this item: http://hdl.handle.net/10267/15779
Title: MATH 108-01, Cryptology, Spring 2011
Authors: Seaton, Christopher
Keywords: Syllabus;Curriculum;Academic departments;Text;Mathematics and Computer Science, Department of;2011 Spring
Issue Date: 12-Jan-2011
Publisher: Memphis, Tenn. : Rhodes College
Series/Report no.: Syllabi CRN;21233
Abstract: The purpose of this course is to examine selected classical and modern methods of message encryption, decryption, and cryptanalysis. In this context, we will develop and use a variety of mathematical tools to describe and study the methods: modular arithmetic, probability, matrix arithmetic, number theory, Boolean functions, and complexity theory. In governments, military organizations, banks, commercial concerns, industries, and ordinary life, there is often a need to communicate where the medium is insecure. Discussions between an ambassador and his or her home government officials about diplomatic strategies may need to be kept from another government with which the ambassador is carrying on negotiations. Orders about battlefield tactics from a central command to soldiers should not fall into the hands of the enemy. A transmission from an automatic teller machine to the bank’s main office containing a patron’s account and balance information should not be readable by thieves. An on-line retailer (or a customer) does not want the credit card numbers of people ordering its products to be obtained by thieves. A company transmitting sensitive or proprietary information among its offices in geographically diverse locations does not want its trade secrets to land in the hands of its competitors. Two individuals corresponding by email may not want their communications to be readable by packet sniffers. These are some of the basic and direct application areas for cryptography, the science and art of secret writing. On the other hand, law enforcement may be monitoring encrypted communications among suspected criminals. The military of one country may be gathering transmissions between an enemy state and its allies or between the state and its armed forces in the field in an attempt to read them and improve their own strategic effectiveness. Turning such “scrambled” communications into comprehensible messages is the process of cryptanalysis, which can be a difficult undertaking and one that can be aided by mathematical techniques. To understand the effectiveness of a cryptographic method, a designer or user of the method not only needs to be able to carry through the steps of encryption and decryption accurately and efficiently, but he or she needs to play the role of cryptanalyst on the method. So the activities of cryptography and cryptanalysis are intimately related; together they are often referred to as cryptology.
Description: This syllabus was submitted to the Office of Academic Affairs by the course instructor. Uploaded by Archives RSA Josephine Hill.
URI: http://hdl.handle.net/10267/15779
Appears in Collections:Course Syllabi

Files in This Item:
File Description SizeFormat 
2011_Spring_Math_108-01_21233.pdf60.59 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.