Difference between revisions of "Advanced Cryptology"
Dragono193 (talk | contribs) |
|||
Line 1: | Line 1: | ||
{{CTY Courses}} | {{CTY Courses}} | ||
− | [[Advanced Cryptology]] is a [[Lancaster|CTY Lancaster]] course with a prerequisite of | + | [[Advanced Cryptology]] is a [[Lancaster|CTY Lancaster]] course with a prerequisite of CTY's [[Cryptology]] course (though enforcement of this prerequisite is questionable). |
==Course Description== | ==Course Description== | ||
− | :'''From the CTY course catalog:''' | + | :'''From the CTY course catalog during the Princeton Days:''' |
In today’s environment, data transmission and data security play an ever critical role in the global marketplace and national security. This course focuses on code making and code breaking. By examining vulnerabilities of encryption systems and writing their own code, students learn the complexity of topics ranging from securely transmitting personal information during online business transactions to decoding secret communiqués that threaten our collective welfare. | In today’s environment, data transmission and data security play an ever critical role in the global marketplace and national security. This course focuses on code making and code breaking. By examining vulnerabilities of encryption systems and writing their own code, students learn the complexity of topics ranging from securely transmitting personal information during online business transactions to decoding secret communiqués that threaten our collective welfare. | ||
While Cryptology is mostly based around mechanical ciphers (Caesar wheel, Playfair grid) Advanced Cryptology focuses on computerized ciphers that have been in use within the past fifty years. The course is much more math-intensive than Cryptology, and more mathematical concepts are covered in order to facilitate the making and breaking of computerized codes. In addition to the Extended Euclidean Algorithm that was introduced in Cryptology, Advanced Cryptology utilizes methods of factorization and tests of the primality of numbers in order to break (or check the strength of) more difficult ciphers like the El Gamal or the McEliece ciphers. Students also write programs using Java to do a number of functions, ranging from solving a Caesar Shift cipher to converting temperature or even drawing a picture on the computer (as demonstrated by Weegee, LAN.10.1) | While Cryptology is mostly based around mechanical ciphers (Caesar wheel, Playfair grid) Advanced Cryptology focuses on computerized ciphers that have been in use within the past fifty years. The course is much more math-intensive than Cryptology, and more mathematical concepts are covered in order to facilitate the making and breaking of computerized codes. In addition to the Extended Euclidean Algorithm that was introduced in Cryptology, Advanced Cryptology utilizes methods of factorization and tests of the primality of numbers in order to break (or check the strength of) more difficult ciphers like the El Gamal or the McEliece ciphers. Students also write programs using Java to do a number of functions, ranging from solving a Caesar Shift cipher to converting temperature or even drawing a picture on the computer (as demonstrated by Weegee, LAN.10.1) | ||
+ | |||
+ | :'''From the CTY course catalog of now:''' | ||
+ | |||
+ | In today’s environment, data transmission and data security play an increasingly critical role in the global marketplace and in national security. Picking up where our Cryptology course leaves off, this class delves further into the rich mathematics behind the science of secret keeping. | ||
+ | |||
+ | Students begin with a review of key concepts covered in the first-level course, then progress into the study of more complicated cipher techniques and additional topics from number theory. Students also examine how other areas of mathematics and computer programming are applied to cryptology. For example, they employ computational techniques to learn about statistical attacks on cryptosystems. | ||
+ | |||
+ | In addition, students deepen their knowledge of historical cryptography systems. They develop a more nuanced understanding of the techniques used in breaking the Enigma devices used during World War II and investigate the inner workings of the M-209, a device of the same era that was used primarily by the United States military. Students leave this course with an advanced understanding of the mathematical basis and history of cryptology. | ||
==Class History== | ==Class History== |
Revision as of 11:08, 6 August 2011
Advanced Cryptology is a CTY Lancaster course with a prerequisite of CTY's Cryptology course (though enforcement of this prerequisite is questionable).
Course Description
- From the CTY course catalog during the Princeton Days:
In today’s environment, data transmission and data security play an ever critical role in the global marketplace and national security. This course focuses on code making and code breaking. By examining vulnerabilities of encryption systems and writing their own code, students learn the complexity of topics ranging from securely transmitting personal information during online business transactions to decoding secret communiqués that threaten our collective welfare.
While Cryptology is mostly based around mechanical ciphers (Caesar wheel, Playfair grid) Advanced Cryptology focuses on computerized ciphers that have been in use within the past fifty years. The course is much more math-intensive than Cryptology, and more mathematical concepts are covered in order to facilitate the making and breaking of computerized codes. In addition to the Extended Euclidean Algorithm that was introduced in Cryptology, Advanced Cryptology utilizes methods of factorization and tests of the primality of numbers in order to break (or check the strength of) more difficult ciphers like the El Gamal or the McEliece ciphers. Students also write programs using Java to do a number of functions, ranging from solving a Caesar Shift cipher to converting temperature or even drawing a picture on the computer (as demonstrated by Weegee, LAN.10.1)
- From the CTY course catalog of now:
In today’s environment, data transmission and data security play an increasingly critical role in the global marketplace and in national security. Picking up where our Cryptology course leaves off, this class delves further into the rich mathematics behind the science of secret keeping.
Students begin with a review of key concepts covered in the first-level course, then progress into the study of more complicated cipher techniques and additional topics from number theory. Students also examine how other areas of mathematics and computer programming are applied to cryptology. For example, they employ computational techniques to learn about statistical attacks on cryptosystems.
In addition, students deepen their knowledge of historical cryptography systems. They develop a more nuanced understanding of the techniques used in breaking the Enigma devices used during World War II and investigate the inner workings of the M-209, a device of the same era that was used primarily by the United States military. Students leave this course with an advanced understanding of the mathematical basis and history of cryptology.
Class History
Originally started in Princeton on a trial, Advanced Cryptology has since moved to Lancaster, where Steven "Wizard" Earthbourne and David "Sideshow" Perry taught the first true offering of the course at LAN.10.1. One of the few CTY courses with two instructors, the twenty two students who took part formed the first ever COD2 class. Topics ranged from statistics to the M-209 machine, and there was a large Java programming element to the course.