Cybersecurity
Virtual Visit Request info Apply
MENUMENU
  • Graduate Teaching Programs
  • Technology Transfer
  • Publications
  • Documents
  • IN
  • Cybersecurity
  • Graduate Courses

Contact Cybersecurity

Email:
ian.burke​@nau.edu
Call:
928-523-0101

Graduate Courses

INF638: “Elements of Cryptography and Public Key Infrastructure (PKI)”

  • Course Description Tab Open

  • Course Requirements Tab Closed

  • Course Materials Tab Closed

Course Description Accordion Open

The course describes symmetrical cryptographic methods (DES, and AES), asymmetrical cryptographic methods, and Diffie-Hellman based PKI (RSA, elliptic curve cryptography). The elements of mathematics important to cryptography are presented (number theory, Galois fields, Euclidian algorithms, Euler-Fermat theorems, fast exponential algorithms, and the formation of cyclic groups for ECC). Recent developments in cryptography are also presented: quantum key distribution (QKD), post quantum cryptography (ex. Shor algorithms), blockchain technology, digital signatures, and hash based cryptography (Lamport, HORS, Winternitz, Merkel Trees).

Course Requirements Accordion Closed

Graduate Status or Override from Dr. Cambou

Course Materials Accordion Closed

1 — Definitions (20)

2– Introduction Number theory (full)

3– Early cryptographic methods (full)

4– DES (Full)

5A– Math for AES (full)

5B—AES algorithm (full)

6A- Quantum Cryptography-QKD (Full)

6B- Quantum Computing(Full)

6C- Post Quantum Crypto(full)

8A- Math for RSA (full)

8B- RSA crypto (full)

9A- ECC prime fields (full)

9B- ECC extended fields (full)

10 PKI & Digital signatures (full)

Homework INF638 1-10B

 

INF639: “Nanomaterials and Nanoelectronics for Cybersecurity”

  • Course Description Tab Open

  • Course Requirements Tab Closed

  • Course Materials Tab Closed

Course Description Accordion Open

This course presents elements of nanotechnologies and several nanoelectronic components (MOSFET, SRAM cell, DRAM cell, Flash cell, Resistive RAM cells, memristors, and Sensors). The design and use of secure elements and their related security limitations under side-channel attacks are presented. This course also reviews, in detail, the design of True Random Number Generators (TRNGs), and physically unclonable functions (PUF) from nanoelectronic devices. The cryptographic protocols exploiting nanomaterials that are presented include: password generators, password managers, public key exchange for PKI and DSA, keyless encryption, noise induced encryption, and hash-based cryptography.

Course Requirements Accordion Closed

Graduate Status or Override from Dr. Cambou

Course Materials Accordion Closed

Micro to nanoelectronics

Intro. to cryptography

Public Key cryptography

6 – MOS transistor – logic circuits

8-1 PUF architecture

8-2 Early PUF designs

8-3 Memory PUF

8-4 TRNGs