Abstract
Knowledge of mathematical foundations of Cryptography is of paramount importance for students wanting to succeed in graduate degree programs in Computer Science with concentration in security. Cryptography, a relatively new field, has yet to establish a core set of topics and the optimal sequence of their presentation to prepare students for a career in the field of IT security. This paper presents syllabi of two courses on public and private key cryptography offered to continuing education students at Boston University.
Please use the following format when citing this chapter: Temkin. A., 2007. in IFIP International Federation for Information Processing. Volume 237. Fifth World Conference on Information Security Education, eds. Futcher, L., Dodge, R., (Boston: Springer), pp. 121–128.
Chapter PDF
Similar content being viewed by others
Keywords
- Block Cipher
- Message Authentication Code
- Oblivious Transfer
- Euclidean Algorithm
- Transport Layer Security
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Zlateva, T et al. Integrated Curricula for Computer and Network Security Education, Proceedings of the Colloquium for Information Systems Security Education, Society for Advancing Information Assurance and Infrastructure Protection, Washington, D.C., June 2003.
Chitkushev, L.T. et al. Laboratory Assignments in Security Education, Proceedings of the 4th World Conference on Information Security Education. Editors: Natalia Miloslavskaya, Helen L. Armstrong. Success Through Information Security Knowledge, IFIP TC11 / WG11.8 Forth World Conference on Information Security Education (WISE 4), June 18–20, 2005, Moscow, Russia. ISBN 5-7262-0565-0
Vygotsky, L.S., Mind in Society: The Development of Higher Psychological Processes, Cambridge, Mass: Harvard University Press, 1978
Garrett, P. Making, Breaking Codes: An Introduction to Cryptology. Upper Saddle River, NJ: Prentice Hall, 2001
Stallings W. Cryptography and Network Security: Principles and Practices, 4th edition. Upper Saddle River, NJ: Prentice Hall, 2006
Washington, Lawrence C. Elliptic Curves, Number Theory and Cryptography, Chapman & Hall/CRC 2003
Stinson, Douglas R. Cryptography: Theory and Practice, 3d edition, Chapman & Hall/CRC 2006
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 International Federation for Information Processing
About this paper
Cite this paper
Temkin, A. (2007). Teaching Cryptography to Continuing Education Students. In: Futcher, L., Dodge, R. (eds) Fifth World Conference on Information Security Education. WISE 2007. IFIP Advances in Information and Communication Technology, vol 237. Springer, New York, NY. https://doi.org/10.1007/978-0-387-73269-5_16
Download citation
DOI: https://doi.org/10.1007/978-0-387-73269-5_16
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-73268-8
Online ISBN: 978-0-387-73269-5
eBook Packages: Computer ScienceComputer Science (R0)