Cryptography and Computer Security for - Rose

advertisement
Cryptography and Computer
Security for Undergraduates
Suzanne E. Gladfelter
Penn State York
sgladfelter@psu.edu
www.yk.psu.edu/~sg3
March 4, 2004
Course Overview



Introductory course
Team taught, multidisciplinary
Pre-requisites
–
–
–
5th semester standing (juniors)
Completed college algebra
Minimal computing experience (user)
March 4, 2004
ACM SIGCSE - Norfolk, VA
Course Content
“Computing is a broad field that extends
beyond the boundaries of computer science”
(CC2001)

Science, Technology & Society
www.yk.psu.edu/~sg3/sts497a
Bibliography of resources
March 4, 2004
ACM SIGCSE - Norfolk, VA
Course Content


Strong historical component
Mathematics
–
–

Number theory
Relevant math as needed to discuss RSA & PGP
Computer Science
–
Tie together and implement


March 4, 2004
Historical algorithms
Mathematics
ACM SIGCSE - Norfolk, VA
Where Does This Course “Fit”
in CS/IST Curriculum?



Elective
Support course
Fulfill general education requirements
March 4, 2004
ACM SIGCSE - Norfolk, VA
How is cryptography integrated
into CS/IST curriculum?





CS0 / IST Intro
Programming / Algorithms
Network security / Wireless
Database / Mobile technologies
Web technologies / E-commerce
March 4, 2004
ACM SIGCSE - Norfolk, VA
CC2001 - Cryptography Topics
AL9. Cryptographic algorithms
[elective]
NC3. Network security [core]
Minimum core coverage time: 3
hours
Topics:
√ Historical overview of cryptography
√ Private-key cryptography and the
key-exchange problem
√ Public-key cryptography
√ Digital signatures

Security protocols

Applications (zero-knowledge
proofs, authentication, and so on)
Topics:
√ Fundamentals of cryptography
√ Secret-key algorithms
√ Public-key algorithms

Authentication protocols
√ Digital signatures
√ Examples
March 4, 2004
ACM SIGCSE - Norfolk, VA
CC2001 – Cryptography Learning
Objectives
AL9. Cryptographic algorithms [elective]
NC3. Network security [core]
Minimum core coverage time: 3 hours
Learning objectives:
√ Describe efficient basic number-theoretic
algorithms, including greatest common
divisor, multiplicative inverse mod n, and
raising to powers mod n.
√ Describe at least one public-key
cryptosystem, including a necessary
complexity-theoretic assumption for its
security.
Learning objectives:
√ Discuss the fundamental ideas of publickey cryptography.
√ Describe how public-key cryptography
works.
√ Distinguish between the use of private- and
public-key algorithms.

Summarize common authentication
protocols.
√ Generate and distribute a PGP key pair and
use the PGP package to send an
encrypted e-mail message.
√ Summarize the capabilities and limitations
of the means of cryptography that are
conveniently available to the general
public.
March 4, 2004
ACM SIGCSE - Norfolk, VA
PSU Center of Academic Excellence
for Information Assurance Education
http://net1.ist.psu.edu/cica/home.htm
http://net1.ist.psu.edu/cica/
March 4, 2004
ACM SIGCSE - Norfolk, VA
Download