Difference between revisions of "Advanced Cryptology"

From RealCTY
Jump to navigation Jump to search
Line 7: Line 7:
  
 
In today’s environment, data transmission and data security play an ever critical role in the global marketplace and national security. This course focuses on code making and code breaking. By examining vulnerabilities of encryption systems and writing their own code, students learn the complexity of topics ranging from securely transmitting personal information during online business transactions to decoding secret communiqués that threaten our collective welfare.
 
In today’s environment, data transmission and data security play an ever critical role in the global marketplace and national security. This course focuses on code making and code breaking. By examining vulnerabilities of encryption systems and writing their own code, students learn the complexity of topics ranging from securely transmitting personal information during online business transactions to decoding secret communiqués that threaten our collective welfare.
 +
 +
While Cryptology is mostly based around mechanical ciphers (Caesar wheel, Playfair grid) Advanced Cryptology focuses on computerized ciphers that have been in use within the past fifty years. The course is much more math-intensive than Cryptology, and more mathematical concepts are covered in order to facilitate the making and breaking of computerized codes. In addition to the Extended Euclidean Algorithm that was introduced in Cryptology, Advanced Cryptology utilizes methods of factorization and tests of the primality of numbers in order to break (or check the strength of) more difficult ciphers like the El Gamal or the McEliece ciphers. Students also write programs using Java to do a number of functions, ranging from solving a Caesar Shift cipher to converting temperature or even drawing a picture on the computer (as demonstrated by Weegee, LAN.10.1)
  
 
==Class History==
 
==Class History==

Revision as of 09:32, 10 June 2011

Part of a series on
Realcty logo 20060831.png
CTY Courses
Category · Template · CAA Courses
Sites
Baltimore · Carlisle · Lancaster · Los Angeles · Saratoga Springs · Seattle
Humanities
Logic: PoR
International Politics ·
Ethics · Existentialism
Philosophy of Mind
Cognitive Psychology · Linguistics
Dissent
Newton, Darwin, and Einstein
The Art and Science of Filmmaking
Beyond the Binary: A Cultural History of Gender
Laws and Orders: Legal Systems Around the World
Writing
Writing Your World
Fiction and Poetry
Utopias and Dystopias
Persuasion and Propaganda
The Art of Fiction
Math
Probability and Game Theory
Number Theory · Mathematical Logic
Cryptology · Combinatorics and Graph Theory
Topology
Economics
Macroeconomics and the Global Economy
Fundamentals of Microeconomics
Computer Science
Data Structures and Algorithms
Fundamentals of Computer Science
Science
FPHS Biology · FPHS Chemistry · FPHS Physics
Astrophysics
Paleobiology · Genetics · Neuroscience
Investigations in Engineering
Introduction to Biomedical Sciences · Electrical Engineering
Special Relativity
Princeton & Berkeley
Global Politics: Human Rights and Justice
Human Nature and Technology
Politics and Film · Epidemiology
The Mathematics of Competitive Behavior
Science, Technology and Public Policy
Race and Politics · Politics in the Middle East
The Global Environment
Playing God: The Ethics of Human Subjects Research
You Will Be Offended: Satire, Comedy, and Public Discourse
Defunct Courses
Beginning Ancient Greek · German 1
German 2
Latin 2
French 1 · French 2
Great Revolutions
American History
Modern European History · Eastern European History
Music Theory
History of Western Art
Renaissance Art
Introduction to American Studies: Race and Class
Medieval Art
Twentieth Century Art · Gandhi's India
American Studies: The Sixties · Women and US Social Reform
American Studies: The Harlem Renaissance
Intermediate Ancient Greek
Islam · The Asian Pacific Rim
Russian History
TCE: Literature and the Arts · TCE: Popular Culture
The Crafting of Drama
The Crafting of Poetry · TCE: Shakespeare
TCE: Science Fiction
TCE: Beyond the Ring and the Wardrobe
Advanced Mathematical Modeling
Advanced Mathematical Reasoning
Statistics · Calculus: A Conceptual Approach
Topics in Precalculus
Set Theory · Digital Logic
Theoretical Foundations of Computer Science
Introduction to Laboratory Sciences · Archaeology
Ecology
Microbiology · Selected Topics in Advanced Biology
Selected Topics in Advanced Chemistry
Selected Topics in Advanced Physics · Physical Anthropology
Advanced Physics: Mechanics
Scientific Investigations: St. Mary's River · Genomics
Volcanoes
Etymologies · Oceanography: The Hawaiian Pacific
Life Cycle of an Island: Hawaii
The History of Disease · The Critical Essay: Film
Wicked Art: Pictures, Pixels, and Pens
Latin I
Goodwives and Witches: Women in Colonial America
Freaks and Geeks in Popular Media
The Digital Revolution
Advanced Robotics
Theory of Computation
Individually Paced Mathematics Sequence
Service, Leadership & Community Transformation
Advanced Cryptology
Law and Politics in US History
Intro to Organic Chemistry

Advanced Cryptology is a CTY Lancaster course with a prerequisite of either CTY's Cryptology course or at least a B in Algebra II.

Course Description

From the CTY course catalog:

In today’s environment, data transmission and data security play an ever critical role in the global marketplace and national security. This course focuses on code making and code breaking. By examining vulnerabilities of encryption systems and writing their own code, students learn the complexity of topics ranging from securely transmitting personal information during online business transactions to decoding secret communiqués that threaten our collective welfare.

While Cryptology is mostly based around mechanical ciphers (Caesar wheel, Playfair grid) Advanced Cryptology focuses on computerized ciphers that have been in use within the past fifty years. The course is much more math-intensive than Cryptology, and more mathematical concepts are covered in order to facilitate the making and breaking of computerized codes. In addition to the Extended Euclidean Algorithm that was introduced in Cryptology, Advanced Cryptology utilizes methods of factorization and tests of the primality of numbers in order to break (or check the strength of) more difficult ciphers like the El Gamal or the McEliece ciphers. Students also write programs using Java to do a number of functions, ranging from solving a Caesar Shift cipher to converting temperature or even drawing a picture on the computer (as demonstrated by Weegee, LAN.10.1)

Class History

Originally started in Princeton on a trial, Advanced Cryptology has since moved to Lancaster, where Steven "Wizard" Earthbourne and David "Sideshow" Perry taught the first true offering of the course at LAN.10.1. One of the few CTY courses with two instructors, the twenty two students who took part formed the first ever COD2 class. Topics ranged from statistics to the M-209 machine, and there was a large Java programming element to the course.