INCS 741 Cryptography

Fall 2011 - 3 Credits

New York Institute of Technology-Amman's Campus


  • Schedule and Classroom: Sat 6:00-9:00 PM. Meeting Room: C103
  • In order to view or print the PDF files, you need Adobe Acrobat Reader. Make sure that you install the most recent version of Acrobat Reader in your computer, otherwise, you may not be able to view or print the documents found on this site.
  • Why should you care about this class? Read this article. (Published in IEEE Computer.)
  • Alice and Bob: Security's inseparable couple.

  • Please read chapter 1 from the text book.

  • Overview and Chapter 2 slides are now posted.
  • Check this AES Flash.
  • THE BOOK Click Here




  • Midterm  Exam: TBA
  • Final Exam: TBA

Homework Assignments

  • HW1 - DUE Mon  24/10/2011 by 11:30 PM : Search the web and find 6 major computer and/or network security companies and identify a product from each company. Provide the following:

        1. URL of the company website,

         2. URL of the product website, 

        3. A brief description of the product (one paragraph in your own words).  

All homework assignments are submitted by email to : Please name your file as your last name followed by homework number, for example, tawalbeh-hw1.pdf.
Also make sure that your name is printed within the homework file. Late HWs are not accepted

Course Plan

Week 1a: Introduction and Basic Concepts: Introduction ; Introduction to Security Chapter 1

Weeks 1a: Chapter 2: Classical Encryption Techniques Chapter 2

Weeks 1b: Chapter 3: Block Cipher and DES Chapter 3

Weeks 1b:  Chapter 5: Advanced Encryption Standard (AES) Chapter 5 Federal Publication (AES) FIPS-197

Week 2:  Chapter 6: Contemporary Symmetric Chiphers Chapter 6

Week 3::Chapter 9: Public Key Cryptography and RSA: Chapter 9

Week 4a: Chapter11: Message Authentication and Hash Functions Chapter 11

Week 4a: Chapter12: Hash Algorithms Chapter 12, SHA Federal Publication FIPS 180-2

 Week 5: Chapter13: Digital Signatures Chapter 13

Catalog Description

Introduction to key issues in cryptography. Topics covered include definitions of security, digital signatures, cryptographic hash functions, authentication, symmetric and asymmetric encryption, stream ciphers, and zero-knowledge proof systems.


knowledge of undergraduate introduction to computer and networking security or equivalent, and discrete math.


  • Introduction: Security attacks to information systems. Threat model. Security services. Mechanisms for providing confidentiality, authentication, integrity, nonrepudiation, and access control. Cryptography in data and communication security.
  • Secret-Key and Public-Key Cryptography: Cryptosystems and cryptanalysis. Block ciphers and stream ciphers. DES, AES, and RC4. Modes of operation. Confidentiality using encryption. Key distribution. Random number generation. Hashes and message digests. One-way functions. Trapdoor one-way functions. Public-key cryptosystems. RSA, Diffie-Hellman, ElGamal, and elliptic curve cryptosystems.
  • Authentication: Overview of authentication systems. Authentication of people. Security handshake pitfalls. Strong password protocols. Digital signatures. One-way and mutual authentication protocols. d 

The Book

W. Stallings. Cryptography & Network Security, Fourth Edition, Prentice Hall, 2006.

More Information about the Book

Grading Plan

  • HW Assignments/Presentations: 25 %  
  • Mid Exam: 25 %
  • Final: 50 %


This class is open to undergraduate students in the last year.

Dr. Lo'ai A. Tawalbeh

                                                                          16 October 2011