Teaching Cryptography to Continuing Education Students

  • Anatoly Temkin
Part of the IFIP — International Federation for Information Processing book series (IFIPAICT, volume 237)


Knowledge of mathematical foundations of Cryptography is of paramount importance for students wanting to succeed in graduate degree programs in Computer Science with concentration in security. Cryptography, a relatively new field, has yet to establish a core set of topics and the optimal sequence of their presentation to prepare students for a career in the field of IT security. This paper presents syllabi of two courses on public and private key cryptography offered to continuing education students at Boston University.


Block Cipher Message Authentication Code Oblivious Transfer Euclidean Algorithm Transport Layer Security 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Zlateva, T et al. Integrated Curricula for Computer and Network Security Education, Proceedings of the Colloquium for Information Systems Security Education, Society for Advancing Information Assurance and Infrastructure Protection, Washington, D.C., June 2003.Google Scholar
  2. 2.
    Chitkushev, L.T. et al. Laboratory Assignments in Security Education, Proceedings of the 4th World Conference on Information Security Education. Editors: Natalia Miloslavskaya, Helen L. Armstrong. Success Through Information Security Knowledge, IFIP TC11 / WG11.8 Forth World Conference on Information Security Education (WISE 4), June 18–20, 2005, Moscow, Russia. ISBN 5-7262-0565-0Google Scholar
  3. 3.
    Vygotsky, L.S., Mind in Society: The Development of Higher Psychological Processes, Cambridge, Mass: Harvard University Press, 1978Google Scholar
  4. 4.
    Garrett, P. Making, Breaking Codes: An Introduction to Cryptology. Upper Saddle River, NJ: Prentice Hall, 2001Google Scholar
  5. 5.
    Stallings W. Cryptography and Network Security: Principles and Practices, 4th edition. Upper Saddle River, NJ: Prentice Hall, 2006Google Scholar
  6. 6.
    Washington, Lawrence C. Elliptic Curves, Number Theory and Cryptography, Chapman & Hall/CRC 2003Google Scholar
  7. 7.
    Stinson, Douglas R. Cryptography: Theory and Practice, 3d edition, Chapman & Hall/CRC 2006Google Scholar

Copyright information

© International Federation for Information Processing 2007

Authors and Affiliations

  • Anatoly Temkin
    • 1
  1. 1.Department of Computer Science, Metropolitan CollegeBoston UniversityBostonUSA

Personalised recommendations