## ENGI 8868/9877 - Computer and Communications Security

Graduate student project presentation schedule and instructions are posted below.

Note that all students (undergraduate and graduate) are expected to attend all presentations.

### GENERAL INFO

[Undergrad ENGI 8868: OUTLINE]

[Grad ENGI 9877: OUTLINE]

Hardcopies of course outlines will be distributed in the first class.

[8868 Accreditation Info]

### NOTES

Introduction (Do not print. A hardcopy will be distributed in the first class.)

Classical Cryptography

Information Theoretic View of Cryptography

(Reference source: "Cryptography: Theory and Practice" by Douglas R. Stinson, available in the MUN Library or you can borrow from me.)

Block Ciphers

Public Key Cryptography

Key Distribution

Authentication and Digital Signatures

Pseudorandom Number Generators

Cryptographic "Snake Oil"

### ASSIGNMENTS

Assignment 1 is adjusted to move some questions to Assignment 2. (Wed., Jan. 25)

Adjusted Assignment 1 (Part A) [For both Undergrad and Grad. Due Feb. 3.]

Assignment 1 (Part B) Ciphertext file: A1_ctext.txt [For Grad students only. Due Feb. 3.]

Assignment 2 Ciphertext file: A2_ctext.txt [Due Feb. 17.]

Assignment 3 [Due Mar. 20.]

Assignment 4 [Due Apr. 3.]

### TESTS

Midterm Answers

The midterm is postponed until Friday, March 3, in-class.

The midterm will cover all material up to, but not including, Section (f) Modes of Operation.

Only basic scientific calculators are allowed and some formulas will be included on the cover page. See here.

Dr. Heys will be in his office during the following times this week:

___ Monday: 4:00-5:00

___ Tuesday: 2:00-3:00, 4:00-5:00

___ Wednesday: 11:00-1:00, 4:00-5:00

___ Thursday: 2:00-3:00, 4:00-5:00

Good luck!

### PROJECT INFO (Grad Students Only)

Project schedule:

__ Monday, April 3

_____ Mandeep Singh Mann, "Security of Advanced Encryption Standard (AES)"

_____ Ahmed Melad, "Modern Stream Ciphers"

__ Wednesday, April 5

_____ Debobrata Gupta, "Survey on Different Modern Modes of Operation of Block Ciphers"

_____ Boxuan Li, "A Comparison Study on Hash Codes"

Project presentation: Instructions

Project Information