Week 1 (rev. 2) |
Professor M. J. Fischer | January 11 & 13, 2005 |
- What can be done with it?
- This leads to a study of cryptographic algorithms and protocols.
- What are its properties?
- This leads to modeling and analysis, which very quickly requires complexity theory, probability theory, and statistics.
- How is it built?
- This requires a fair amount of mathematics, particularly number theory and algebra. Don't worry if you haven't studied these topics before. We will cover what is need for the methods discussed in this course.
- How is it implemented?
- Implementing cryptographic primitives requires a lot of attention to detail, especially to make sure that the programs don't accidentally leak secret information. This course will involve some implementation.
|
|
|