ࡱ> \^[ LbjbjT~T~ GR66$  8SdT,n Y6t<+++++++$.0 ,EQU ,4N, + + rK)T'*p`M)+d,0,)z&1&1'*'*&1;*? l??? , ,???,&1????????? : Omnibus* Course Syllabus School of Letters, Arts, and Sciences Department: Mathematical and Computer Sciences Instructor: Judith S. Gurka Prefix and Course Number:  FORMTEXT CS 390__ Semester/year offered:  FORMTEXT Fall 2011 Banner Number (for Academic Affairs use):__________________________ (Students registering after Census date will be ineligible for the COF stipend and must pay the full tuition for the omnibus course. Please see COF-FAQ for details regarding registration deadlines:  HYPERLINK "http://www.mscd.edu/news/cof/cof_faq.htm" http://www.mscd.edu/news/cof/cof_faq.htm) Course Title:  FORMTEXT Introduction to Cryptography Credit Hours: 2 (2+0) Total Contact Hours per semester (assuming 15-16 week semester): Lecture 30 Lab 0 Internship 0 Practicum 0 Other (specify type and hours): 0 Meeting Times/Dates:  FORMTEXT TR 4:00-5:50 PM 1st eight weeks Grading Mode(s):  FORMTEXT Letter Schedule Type(s):  FORMTEXT Lecture Prerequisites:  FORMTEXT MTH 3100 or MTH 390K or MTH 3170 and CS 2050, or permission of instructor Corequisites:  FORMTEXT       Banner Enforced: Prerequisite(s):  FORMTEXT MTH 3100 or MTH 390K or MTH 3170 and CS 2050 Corequisite(s):  FORMTEXT       Prerequisite(s) or Corequisite(s):  FORMTEXT       Course Description:  FORMTEXT This course is an introduction to the history, methods, limitations, and computer security applications of cryptography. Students will learn and program the algorithms for encryption and decryption. Required Reading Materials (example: Smith, John (2004) Book of Examples. New York, NY: McGraw-Hill.) Text: The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography by Simon Singh, Anchor Books, 1999/2000. ISBN: 0-385-49532-3, or similar book (coverage is equivalent to parts 1 and 2 of Cryptography and Network Security: Principles and Practices, by Stallings). Web site (parts): www.schneier.com/cryptography, Bruce Schneier Evaluation of Student Performance (format - 1, a, i, ii, etc.): Assignments and projects (programming and non-programming). Presentations. Tests (including final exam). Specific Measurable Student Behavioral Learning Objectives (format - 1, a, i, ii, etc.): Upon completion of this course the student should be able to: Encode and decode messages using the algorithms covered, by hand or using computer programs, as appropriate. Evaluate a given algorithm for weaknesses. Compare any two algorithms for relative security (i.e., difficulty to cryptanalyze). Detailed outline of course content (major topics and subtopics) or outline of field experience/ internship (experience, responsibilities and supervision) (format I, A, 1, a, etc.) Historical codes and cryptography non-cryptographic codes early cyyptography: e.g., Cesear cipher one-time pads Enigma and Turing Types of computer codes error-detecting and error-correcting parity, Huffman codes, etc. Cryptography concepts and terminology code strengths and weaknesses cryptanalysis / attacks confidentiality, integrity, authentication, etc. applications e.g., digital signature Types of ciphers substitution ciphers: monoalphabetic and polyalphabetic, solutions by letter frequency transposition ciphers: single and repeated, solutions by patterns combinations / diffusion: e.g., Polybius, Playfair product ciphers / secret keys Block ciphers / DES & AES motivation and development algorithms: original, number of bits, double and triple DES weaknesses and attacks Private (secret) key systems methods and algorithms limitations Math background random and pseudorandom numbers number theory modular arithmetic primes and factoring public key systems principles RSA Diffie-Hellman please see note below: Excerpt from METROPOLITAN STATE COLLEGE of DENVER GUIDELINES FOR THE PROTECTION OF HUMAN SUBJECTS Available in full on the MSCD web site:  HYPERLINK "http://clem.mscd.edu/~forrestj/HSRC%20Docs/The%20Policy.doc" http://clem.mscd.edu/~forrestj/HSRC%20Docs/The%20Policy.doc Research Projects Conducted in Research Classes. Developmental and institutional guidelines for confidentiality and research with human subjects will be taught in depth as a part of course requirements for research classes. Students will be required to develop their own informed consent forms or to use forms developed by faculty members which conform to College guidelines and Department policy (see link above). All student projects will be reviewed and approved by faculty prior to recruiting subjects. (See Example 3 consent form at this link:  HYPERLINK "http://clem.mscd.edu/~forrestj/HSRC.htm" http://clem.mscd.edu/~forrestj/HSRC.htm ). *** This required course content MUST be part of the Detailed outline of course content section of the omnibus course syllabus OR a statement must be attached that clearly states how the proper procedures have been followed by the course instructor and/or the student. The Associate VP for Academic Affairs cannot sign an omnibus syllabus that appears to involve human subjects and/or personal data unless this information is provided.  note: If the omnibus course includes student and/or course instructor research that involves (1) interviewing subjects and/or (2) handling personal data and/or (3) topics which could be viewed as sensitive (e.g., personal political views, health data, sexuality, etc.), then approval by the Office of Academic Affairs will require assurance that the guidelines described at the end of this document have been followed.     Metropolitan State College of Denver Office of Academic Affairs Form rev. 1/09 Approved - Omnibus course: _________________________________________________________ __________________ Department Chair OR Program Director Date _________________________________________________________ __________________ Dean OR Associate Dean of School Date _________________________________________________________ __________________ Office of Academic Affairs Designee Date Approved - Field Experience/Internship Only: ______________________________________________________________________________ Location of Internship _________________________________________________________ __________________ Faculty Evaluation Group Date _________________________________________________________ __________________ Field Supervisor** Date **Approval by the Field Supervisor is required and must be indicated by the original signature of that supervisor on the syllabus. *Guidelines as set forth in Section V. F. of the #$?@AGJKNp|}ƽƟИИЃtgЃh|,>*aJmHnHujh|,>*UaJjh|,>*UaJh@whn+aJ h|,>*aJh hVZ.5aJh@wh ! >*aJh|,h|,5aJh^ h ! aJh h ! 5aJh@wh ! aJh^ h_I5;CJ aJ hp(5;CJ aJ h^ h ! 5;CJ aJ #@A4 _ o5 _0h8p @ xHP X !(#$`'gdo: _0h8p @ xHP X !(#$`'dgd# dgd#xxgd;:gd$a$  4 5 [ d  0 2 3 4 \ ] ^ Ļxm[xNxh\h;:0JCJaJ#jh\h;:CJUaJh;:h;:CJaJjh;:CJUaJh;:CJaJhdvCJaJhQFCJaJh7CJaJhp(hdv5CJaJh*hdvCJaJh@wh ! aJh h ! 5aJh@wh ! >*aJh|,>*aJmHnHujh|,>*UaJjh|,>*UaJ^ _ k m n x y z     % & F G H I K ^ ` ֳ֪xxxqxgh6Kho>*CJ ho>*CJ hA8w>*CJ h|,>*CJhGgLho5CJ h|,CJ hoCJ ho5CJ h ! >*aJh@whn+aJh|,>*aJmHnHujh|,>*UaJ h|,>*aJjh|,>*UaJh@wh ! aJh h ! 5aJh;:h ! CJaJ( I K LNvyzgd0S `'`gdM `'gdM gdV 65 _0h8p @ xHP X !(#$`'gdo` a k l m ȾȾȾ{lbh@whV 6>*aJjh@whV 6>*UaJh@whV 6aJ hV 6aJ h ! >*aJjh|,>*UaJjh|,>*UaJjh|,>*UaJh h ! 5aJh@wh ! aJh|,>*aJmHnHujh|,>*UaJ h|,>*aJjh|,>*UaJ&   2 4 6 "$&:Ļ}sa}ZTHA hM >*CJjhM >*CJU hM CJ hM 5CJ"jhM hM >*UaJhM hM >*aJjhM hM >*UaJh|,>*aJmHnHujh|,>*UaJ h|,>*aJjh|,>*UaJhM hM aJ hV 6>*aJ'jh@whV 6>*UaJmHnHujh@whV 6>*UaJ"jh@whV 6>*UaJ:<>HJLNtvx.K[xyz~ulf_fVLLLh|,h|,>*aJhh|,aJ h6aJ haJh@wh.aJh@wh|,aJh|,h0SaJh|,h|,aJmHnHujh|,h|,UaJh|,h|,aJjh|,h|,UaJ hM aJ h0SaJ h ! aJ hM 5CJ!jhM >*CJUmHnHujhM >*CJUj_hM >*CJUzVe    & F `'gd|, & F ^gd|, `'dhgd|, `'gd|,&)Vde ӱә{ӱӷʷuuoi h|,aJ hD`aJ haJhC}h ! 56\]aJhC}hC}56\]aJ hC}aJhT$h|,CJh7mh|,CJ h|,CJh@wh:KaJh@wh:K6aJh@wh.aJh@wh ! aJh@wh|,aJ h ! aJh|,h|,6>*aJh|,h|,aJ' &4F^,Sd0Nh & F `'gd|, & F `'gd|,#$d%d&d'dNOPQ &FTg|#$d%d&d'dNOPQ & F p`'^`gd|, & F `'gd|, & F `'gd|,ý~mXCm2 h|:5CJOJQJ\^JaJ)h|:h~!56CJOJQJ\^JaJ)h|:h|:56CJOJQJ\^JaJ h~!5CJOJQJ\^JaJ)h''h''56CJOJQJ\^JaJ#hL56CJOJQJ\^JaJ hLaJhP 5\aJh@wh|,aJ h|,CJ h ! aJ haJ#jhkXh0J:H*UaJhD`hD`:aJ hD`aJ h|,aJh|,h|,CJ1nr{ka $Xa$gdv8X1$]v^8gd+$x$d%d&d'dNOPQa$gd|: $xa$gd+ $xa$gd''d-DM gdL#$d%d&d'dNOPQ `'^gd|, 1CEXYZgqu  >@ABȱΦΖ}yqlbl}lRbj4 h|h6Ujh6U h6hh|:6hhh6hh+6h+ h+>* h+h+h0hl0Jh0hl0JaJj h0hlUaJ h+hl hlaJjhlUaJ h~!aJ h+6aJh+h~!6aJ h~!5CJOJQJ\^JaJBijkmnrw|}$%&*-567меЬ{wl`l`l`lXl`Oh 5CJaJh CJaJh^);h 5CJaJh^);h CJaJh h^jh :aJhkXh H*aJ jhkXh 0JH*UaJh^);h^);5:aJh^);5:aJ hkX5aJh^);h''5aJh^);h5aJh^);hl5aJh''h+h|: h6jh6Uh|h0J6r}$ ) * gd/r$a$gd^ h]hgd&$d%d&d'dNOPQgd~!(x$d%d&d'dNOPQgd^); ( ) * D !!!!!!!!%#H#S####L4LL仰䑍䇀useuhp(h 56CJaJUhp(h CJaJ h >*CJ h CJhhQhy{h 5CJh||h 5CJ h 56h/rh CJaJh/rh/rCJaJh=ih 6aJh^ h ;jhzyrUhzyrh h^);h CJaJh^);h 5CJaJ'* E F !9!!!!!Y&$d%d&d'dNOPQgdl)dh$d%d&d'dNOPQgdl&$d%d&d'dNOPQgdl-hdh$d%d&d'dNOPQ]hgdl !1"H"""#%###LL][)$$d%d&d'dNOPQa$gdl&$d%d&d'dNOPQgdl)dh$d%d&d'dNOPQgdl&$d%d&d'dNOPQgdl MSCD Curriculum Guidelines, Policies and Procedures must be followed. A copy of the omnibus course syllabus must be on file in the Office of Academic Affairs prior to the listing of the course in any semester schedule. LLLLLh^);h^);5:aJhzyrh hp(h 56CJaJLLL&$d%d&d'dNOPQgd~!E 000P:poBP/ =!"#$%v DpDText4CS 390__|D Fall 2011DyK )http://www.mscd.edu/news/cof/cof_faq.htmyK Rhttp://www.mscd.edu/news/cof/cof_faq.htmDIntroduction to CryptographyD#TR 4:00-5:50 PM 1st eight weeks5Grading Mode should normally be "L" for letter grade.DText12Letter5Grading Mode should normally be "L" for letter grade.DText13Lecture,Schedule type used must be already approved.DText14IMTH 3100 or MTH 390K or MTH 3170 and CS 2050, or permission of instructorvDText14DText17,MTH 3100 or MTH 390K or MTH 3170 and CS 2050vDText19vDText19DText3This course is an introduction to the history, methods, limitations, and computer security applications of cryptography. Students will learn and program the algorithms for encryption and decryption.]DyK <http://clem.mscd.edu/~forrestj/HSRC%20Docs/The%20Policy.docyK phttp://clem.mscd.edu/~forrestj/HSRC Docs/The Policy.docDyK (http://clem.mscd.edu/~forrestj/HSRC.htmyK Phttp://clem.mscd.edu/~forrestj/HSRC.htm^ 2 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH D`D +Normal1$CJ_HhmH sH tH DA`D Default Paragraph FontViV  Table Normal :V 44 la (k (No List <&@< Footnote Reference4@4 Header  !4 @4 Footer  !H"H VZ. Balloon TextCJOJQJ^JaJ.)1. VZ. Page Number6U@A6 ;: Hyperlink >*B*phHZ@RH ~! Plain Text1$CJOJQJ^Jh:@b: P Footnote TextCJFVqF lFollowedHyperlink >*B* phPK![Content_Types].xmlj0Eжr(΢Iw},-j4 wP-t#bΙ{UTU^hd}㨫)*1P' ^W0)T9<l#$yi};~@(Hu* Dנz/0ǰ $ X3aZ,D0j~3߶b~i>3\`?/[G\!-Rk.sԻ..a濭?PK!֧6 _rels/.relsj0 }Q%v/C/}(h"O = C?hv=Ʌ%[xp{۵_Pѣ<1H0ORBdJE4b$q_6LR7`0̞O,En7Lib/SeеPK!kytheme/theme/themeManager.xml M @}w7c(EbˮCAǠҟ7՛K Y, e.|,H,lxɴIsQ}#Ր ֵ+!,^$j=GW)E+& 8PK!Ptheme/theme/theme1.xmlYOo6w toc'vuر-MniP@I}úama[إ4:lЯGRX^6؊>$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3ڗP 1Pm \\9Mؓ2aD];Yt\[x]}Wr|]g- eW )6-rCSj id DЇAΜIqbJ#x꺃 6k#ASh&ʌt(Q%p%m&]caSl=X\P1Mh9MVdDAaVB[݈fJíP|8 քAV^f Hn- "d>znNJ ة>b&2vKyϼD:,AGm\nziÙ.uχYC6OMf3or$5NHT[XF64T,ќM0E)`#5XY`פ;%1U٥m;R>QD DcpU'&LE/pm%]8firS4d 7y\`JnίI R3U~7+׸#m qBiDi*L69mY&iHE=(K&N!V.KeLDĕ{D vEꦚdeNƟe(MN9ߜR6&3(a/DUz<{ˊYȳV)9Z[4^n5!J?Q3eBoCM m<.vpIYfZY_p[=al-Y}Nc͙ŋ4vfavl'SA8|*u{-ߟ0%M07%<ҍPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 +_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Ptheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] R \^ ` :BLL !#' z r* !LL"$%(3\my`lHXdj$;GY AiFFXFFFFFFFFFFXX@  @ 0(  B S  ?H0(  Text4 _Hlt130274387 _Hlt130274388Text12Text13Text14Text17Text3 _Hlt130274175 _Hlt130274176 _Hlt130262307 _Hlt130262308 _Hlt130274270 _Hlt130274271EE;OO@@@ @ @ @ @ @FFIPP ZeOR[eOZ#\eO[#]eO$]#^eON#_eOd`eO4aeOSbeO!ceOl!deO,!eeO쇽feOd#]]g    eii  = *urn:schemas-microsoft-com:office:smarttags PlaceName= *urn:schemas-microsoft-com:office:smarttags PlaceType9 *urn:schemas-microsoft-com:office:smarttagsplace8 *urn:schemas-microsoft-com:office:smarttagsCity9 *urn:schemas-microsoft-com:office:smarttagsState p#       z ' / $', 6;$33333$?` K K $$($?` K K $$(x2p[ 6zl$?Ё-@oă<h ^`hH.h ^`hH.h pLp^p`LhH.@ ^@ `o(.^`.L^`L.^`.^`.PLP^P`L.h ^`hH.h^`.hpLp^p`L.h@ @ ^@ `.h^`.hL^`L.h^`.h^`.hPLP^P`L.^`.^`.pp^p`.@ @ ^@ `.^`.^`.^`.^`.PP^P`.^`)^`.pLp^p`L.@ ^@ `o(.^`.L^`L.^`.^`.PLP^P`L.$?p[ 6-@ox   b                 b      /_^JM+|:/r^ ! |,Z.Me5,2,~!|#m%''^')n+VZ.V 6;^);QFPG8J:K0M|kT}W>@eg=itFibQoUtogqzyrsztdvA8w@w5yczy{Q#VD`T7_IolM +}l7(aNVG^.'p(9q;:LC}a ^jJ||]l P 0SkXdzG<9$&@@p@p pp @p@UnknownG* Times New Roman5Symbol3. * Arial5. *aTahoma?= * Courier NewA BCambria Math# ha&t&# $# $! dk 2q HX? ! 2!xxCIP Code:______________Charlotte Bakerreedma    Oh+'0  4 @ L Xdlt|CIP Code:______________Charlotte BakerNormalreedma3Microsoft Office Word@_@'I@^^@x`#՜.+,D՜.+,H hp  MSCD$  CIP Code:______________ Title 8@ _PID_HLINKSA1>*(http://clem.mscd.edu/~forrestj/HSRC.htm"w'8http://clem.mscd.edu/~forrestj/HSRC Docs/The Policy.doc*D)http://www.mscd.edu/news/cof/cof_faq.htm  !"#$%&'()+,-./013456789:;<=>?@ABCDEFGHIJLMNOPQRTUVWXYZ]`badefghijklmnopqrstuvwxyz{Root Entry F狇_Data *1Table2B1WordDocumentGRSummaryInformation(KDocumentSummaryInformation8SCompObjyMsoDataStore狇狇   F'Microsoft Office Word 97-2003 Document MSWordDocWord.Document.89qDocumentLibraryFormDocumentLibraryFormDocumentLibraryForm This value indicates the number of saves or revisions. The application is responsible for updating this value after each revision.