Applied Cryptography (CS-GY 6903)

This course examines Modern Cryptography from a both theoretical and applied perspective, with emphasis on “provable security” and “application case studies”. The course looks particularly at cryptographic primitives that are building blocks of various cryptographic applications. The course studies notions of security for a given cryptographic primitive, its various constructions and respective security analysis based on the security notion. The cryptographic primitives covered include pseudorandom functions, symmetric encryption (block ciphers), hash functions and random oracles, message authentication codes, asymmetric encryption, digital signatures and authenticated key exchange. The course covers how to build provably secure cryptographic protocols (e.g., secure message transmission, identification schemes, secure function evaluation, etc.), and various number-theoretic assumptions upon which cryptography is based. Also covered: implementation issues (e.g., key lengths, key management, standards, etc.) and, as application case studies, a number of real-life scenarios currently using solutions from modern cryptography. | Prerequisite: Graduate standing.

Computer Science (Graduate)
3 credits – 14 Weeks

Sections (Fall 2024)


CS-GY 6903-000 (15957)
at ePoly
Instructed by Chen, Zhixiong


CS-GY 6903-000 (15958)
09/03/2024 – 12/12/2024 Tue
6:00 PM – 8:00 PM (Evening)
at Brooklyn Campus
Instructed by Di Crescenzo, Giovanni


CS-GY 6903-000 (15959)
at ePoly
Instructed by Di Crescenzo, Giovanni

Applied Cryptography (CS-UY 4783)

This course examines Modern Cryptography from a both theoretical and applied perspective, with emphasis on “provable security” and “application case studies”. The course looks particularly at cryptographic primitives that are building blocks of various cryptographic applications. The course studies notions of security for a given cryptographic primitive, its various constructions and respective security analysis based on the security notion. The cryptographic primitives covered include pseudorandom functions, symmetric encryption (block ciphers), hash functions and random oracles, message authentication codes, asymmetric encryption, digital signatures and authenticated key exchange. The course covers how to build provably secure cryptographic protocols (e.g., secure message transmission, identification schemes, secure function evaluation, etc.), and various number-theoretic assumptions upon which cryptography is based. Also covered: implementation issues (e.g., key lengths, key management, standards, etc.) and, as application case studies, a number of real-life scenarios currently using solutions from modern cryptography. | Prerequisite: (CS-UY 2134 or CS-UY 1134) and (CS-UY 2124 or CS-UY 1124) (C- or better) and MA-UY 2314.

Computer Science (Undergraduate)
3 credits – 14 Weeks

Sections (Fall 2024)


CS-UY 4783-000 (16117)
09/03/2024 – 12/12/2024 Tue
6:00 PM – 8:00 PM (Evening)
at Brooklyn Campus
Instructed by Di Crescenzo, Giovanni