This preview shows pages 1–12. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.
View Full DocumentThis preview has intentionally blurred sections. Sign up to view the full version.
View Full DocumentThis preview has intentionally blurred sections. Sign up to view the full version.
View Full DocumentThis preview has intentionally blurred sections. Sign up to view the full version.
View Full DocumentThis preview has intentionally blurred sections. Sign up to view the full version.
View Full DocumentThis preview has intentionally blurred sections. Sign up to view the full version.
View Full Document
Unformatted text preview: Modern Cryptography Lecture 1 Yongdae Kim 2 Whos who? 3 Some movies :) 4 Introduction Class Information Title: Modern Cryptography Course Number: CSci 5471 Lectures: TTh 11:15 PM  12:30 PM, ME 212 Has been experimental and challenging to teach this course Trying to learn how to teach this course well 5 Instructor Information Yongdae Kim 7 year old prof :) Hard working, not bright :) Contact information Email: kyd(at)cs.umn.edu preferred Office hours Tentatively, T 1:30 PM~ 2:30 PM, Th 10:00 AM ~ 11:00 AM If impossible, let me know by email If I cannot make it, Ill let you know in advance Else by appointment TA Hun Kang (hkang (at) cs.umn.edu) Office Hour: M 1:15 PM ~ 2:15 PM 6 Prerequisite (Important!!!) Must: Discrete Mathematics, Data Structure or Algorithm and some math Recommended Complexity, Network, Operating System Introduction to Number Theory and Cryptography (Math) Introduction to Computer Security (CS) Quiz Today To understand your mathematical knowledge Nothing to do with your grade 30 minutes will be given 7 Course Objectives To learn mathematical background for cryptographic techniques basic cryptographic techniques for computer and network security how secure these techniques are how to use these techniques securely how to apply these techniques 8 Textbooks Required Handbook of Applied Cryptography by Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone (Editor), CRC Press, ISBN 0849385237, Available online at http:// www.cacr.math.uwaterloo.ca/hac/ Optional (If you want a textbook) Cryptography: Theory and Practice 2/E, Douglas Stinson, Chapman & Hall, ISBN 1584882069 9 Student Expectations See CSci 5471 Survival Guide Keep up with material complete relevant readings before class browse lecture slides Slides will be online the same day, after class Attend lectures Understanding lecture is much more important than reading before class. Feedback!!!! Read your email regularly. No excuses! Quizzes, Exams and homework: Write your own answer Violators will be prosecuted An F in the course is guaranteed 10 Class Information Lecture format Slides (will try to post before class, but not guaranteed) Browse the course Web site often http://wwwusers.itlabs.umn.edu/classes/Spring2010/csci5471/ check it regularly news and lecture notes (in PDF, PPT) will all be there Please read your email! 11 Grading Distribution Final: 28%. (Inclass) 6 biweekly assignments: 18 %. (6 x 3 %) Hard 6 biweekly quizzes: 24 %. (6 x 4% each) Easy 30% of your grade will be based on the project....
View
Full
Document
This note was uploaded on 10/21/2011 for the course CSCI 5471 taught by Professor Staff during the Spring '08 term at Minnesota.
 Spring '08
 Staff

Click to edit the document details