{"id":4713,"date":"2024-12-19T04:21:15","date_gmt":"2024-12-19T04:21:15","guid":{"rendered":"https:\/\/science.sjp.ac.lk\/mat\/?page_id=4713"},"modified":"2024-12-19T04:21:43","modified_gmt":"2024-12-19T04:21:43","slug":"mat-456-2-0-cryptography","status":"publish","type":"page","link":"https:\/\/science.sjp.ac.lk\/mat\/mat-456-2-0-cryptography\/","title":{"rendered":"MAT 456 2.0 Cryptography"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text]<\/p>\n<p><strong>Course:\u00a0\u00a0<\/strong>MAT 456 2.0 Cryptography (Optional)<\/p>\n\n<p><strong>Course Content<\/strong>:<\/p>\n\n<p style=\"text-align: justify;\">Overview of cryptographic systems, Basic terminology and concepts, Symmetric-key encryption, Introduction to cryptanalyses, Mathematical preliminaries, Diffie- Hellman key exchange, Discrete logarithm problem, Public-key encryption, ElGamal public-key encryption, RSA public key cryptosystem, factorization of integers, Elliptic Curves and Cryptography, Block cyphers and DES, Cryptoanalysis of block cyphers, Digital Signatures, Homomorphic encryption, e-voting, Zero-knowledge proofs.<\/p>\n\n<p><strong>Recommended Readings:<\/strong><\/p>\n\n\n<ol type=\"1\">\n<li style=\"list-style-type: none;\">\n<ol type=\"1\"><\/p>\n<li>Hoffstein, J., Pipher, J., Silverman, J.H. and Silverman, J.H., 2008. An introduction to mathematical cryptography (Vol. 1). New York: Springer.<\/li>\n\n\n<li>Menezes, A.J., Van Oorschot, P.C. and Vanstone, S.A., 2018. Handbook of applied cryptography. CRC press.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n\n\n<p>&nbsp;<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text] Course:\u00a0\u00a0MAT 456 2.0 Cryptography (Optional) Course Content: Overview of cryptographic systems, Basic terminology and concepts, Symmetric-key encryption, Introduction to cryptanalyses, Mathematical preliminaries, Diffie- Hellman key exchange, Discrete logarithm problem, Public-key encryption, ElGamal public-key encryption, RSA public key cryptosystem, factorization of integers, Elliptic Curves and Cryptography, Block cyphers and DES, Cryptoanalysis of block cyphers, Digital &hellip; <a href=\"https:\/\/science.sjp.ac.lk\/mat\/mat-456-2-0-cryptography\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">MAT 456 2.0 Cryptography<\/span><\/a><\/p>\n","protected":false},"author":33,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_ti_tpc_template_sync":false,"_ti_tpc_template_id":"","footnotes":""},"_links":{"self":[{"href":"https:\/\/science.sjp.ac.lk\/mat\/wp-json\/wp\/v2\/pages\/4713"}],"collection":[{"href":"https:\/\/science.sjp.ac.lk\/mat\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/science.sjp.ac.lk\/mat\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/science.sjp.ac.lk\/mat\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/science.sjp.ac.lk\/mat\/wp-json\/wp\/v2\/comments?post=4713"}],"version-history":[{"count":2,"href":"https:\/\/science.sjp.ac.lk\/mat\/wp-json\/wp\/v2\/pages\/4713\/revisions"}],"predecessor-version":[{"id":4716,"href":"https:\/\/science.sjp.ac.lk\/mat\/wp-json\/wp\/v2\/pages\/4713\/revisions\/4716"}],"wp:attachment":[{"href":"https:\/\/science.sjp.ac.lk\/mat\/wp-json\/wp\/v2\/media?parent=4713"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}