Codes
and Ciphers
CSC 233 (501)
Marcus
Schaefer
Latest additions
Final papers
Assignments will be available
through this webpage. Written homeworks are due at the beginning of class.
If you hand in the homework late 10% will be taken off the score for each day.
Questions and Answers
-
There is a page with links
for further information.
Schedule
Classes and office hours
The class meets MW 1:30-3:00 (CTI 222).
My office hours are M 4:00-5:30, W 3:15-4:45.
During that time you can find me in the CS&T building,
room 749.
If you want to set up an appointment at another time, or
simply ask a question,
send email to mschaefer@cdm.depaul.edu.
Textbook
As textbook we will use Simon Singh's The Code Book, Anchor 2000 (pb), or
Doubleday, 1999 (hc).
Syllabus
For general information (literature, course summary), see the
class
syllabus.
The following is a very rough schedule, and we might depart from it.
Week 1-4
|
Substitution and transposition ciphers (Mary, Queen of Scots, Arab
Cryptography, Vigenere cipher, Charles Babbage and the Playfair cipher)
|
Week 5-6
|
Cracking the Enigma (Alan Turing in Bletchley Park)
|
Week 7
|
Cryptanalysis and languages (Linear A/B, Rosetta Stone)
|
Week 8-9
|
Public Key Cryptography and Security protocols
|
Week 10
|
Quantum Cryptography
|
Homework, quizzes: 40%, Midterm: 30%, Final (or final project): 30%.
Academic Honesty
- The course adheres to the university guideline on Academic Integrity
Policy (http://www.depaul.edu/~handbook/code17.html):
- Cheating is any action that violates university norms or
instructor's guidelines for the preparation and submission of
assignments. This includes but is not limited to unauthorized access to
examination materials prior to the examination itself; use or possession
of unauthorized materials during the examination or quiz; having someone
take an examination in one's place; copying from another student;
unauthorized assistance to another student; or acceptance of such
assistance.
- Plagiarism is a major form of academic dishonesty involving the
presentation of the work of another as one's own. Plagiarism includes,
but is not limited to the following:
- The direct copying of any source, such as written and verbal
material, computer files, audio disks, video programs or musical
scores, whether published or unpublished, in whole or part, without
proper acknowledgment that it is someone else's.
- Copying of any source in whole or part with only minor changes in
wording or syntax, even with acknowledgment.
- Submitting as one's own work a report, examination paper, computer
file, lab report or other assignment that has been prepared by
someone else. This includes research papers purchased from any other
person or agency.
- The paraphrasing of another's work or ideas without proper
acknowledgment.
- A charge of cheating and/or plagiarism is always a serious matter.
If proven, it can result in an automatic F in the course and possible
expulsion.
- The use of others' web/publication content (text, graphics, codes) is
regarded as plagiarism without giving credit (see the above description of
plagiarism).
- When you directly quote someone's work, you must put it in quotation
marks. Without such quotations and reference, it is regarded as an act of
plagiarism (see the above description of plagiarism).
- Using materials that the student prepared for other purposes (e.g.,
another course or for his/her work) needs the course instructor's prior
permission.
Incomplete
An incomplete grade is given only for an exceptional reason such as a death in
the family, a serious illness, etc. Any such reason must be documented. Any
incomplete request must be made at least two weeks before the final, and
approved by the Dean of the School of Computer Science, Telecommunications and
Information Systems. Any consequences resulting from a poor grade for the
course will not be considered as valid reasons for such a request.
Marcus Schaefer
Last updated: December 9th, 2003.