Course Guidelines Math 133
Dr. R. Beezer Spring 2005

Texts We will be using the following texts, which are available in the Bookstore. The Code Book, by Simon Singh
Mathematics of Cryptography, by Robert A. Beezer
Secrets and Lies, by Bruce Schneier
Crypto, by Steven Levy
Cryptonomicon, by Neal Stephenson
Codes and Ciphers, by Mark Fowler

Home Page Start at http://buzzard.ups.edu/courses.html to locate the WWW page for this course. The course web page has a variety of resources. In some cases these are necessary for working the practicums, in other cases they might be useful as you begin to consider a topic for your position paper.

Office Hours My office is Thompson 321G; the telephone number is 879-3564. Making appointments or simple, non-mathematical questions can be handled via electronic mail -- my address is beezer@ups.edu. Office hours will be 1:00-1:50 on Monday, Tuesday, Wednesday and Friday. I will always be available during these times on a first-come, first-served basis. If these times are not convenient, please do not hesitate to make an appointment with me for another time. You are also welcome to drop by my office without an appointment at any time that I am in (roughly 3 P.M. - 4:30 P.M. is a good time to try). Office hours are your opportunity to receive extra help or clarification on material from class, or to discuss any other aspect of the course.

Practicums There will be ten practical exercises in cryptology through the course. You will be provided with a written description of each on the Friday a week before they are due, and they will be graded on a pass/fail basis. Due dates are given on the schedule -- they are due before the start of class on Fridays, and will not be accepted late. We will have significant time on Mondays to discuss how the practicums are to be worked, so I suggest you review them over the weekend in preparation for Monday’s session. We will not be able to take class time later in the week to discuss them and I generally do not have office hours on Thursdays. Practicums require using a variety of computer resources. These are provided in the computer labs on the first floor of Thompson, which you will have access to. Attempting practicums on your personal machine, using mail systems other than the one provided by UPS (except when explicitly part of the practicum), and off-campus travel are not excuses for a failure to complete a practicum.

Mathematics is not a spectator sport.
   -- Anonymous

I hear, I forget.
I see, I remember.
I do, I understand.
   -- Chinese Proverb

An education is not received. It is achieved.
   -- Anonymous

Reading We will work through Singh’s The Code Book and Beezer’s Mathematics of Cryptography deliberately, and dates for discussing sections of these books are listed on the schedule. Please be prepared for these discussions in advance. Generally we will cover mathematical topics on Wednesdays, with five lectures in the first few weeks, then in-class worksheets for several more weeks. Fridays will be discussions throughout almost the entire semester, with Singh being the primary topic for the first half. We will discuss Crypto and Secrets and Lies near the end of the semester, so you will want to be reading these two books in advance of those discussions. Reading these two books early will also be of some assistance as you formulate topics for your position paper. Cryptonomicon is a novel, and you will be expected to be reading it uniformly through the semester. For example, you should be one-third of the way through by the time we have the first examination.

Puzzles The Codes and Ciphers book has 20 puzzles. The schedule indicates on most every Monday just where you should be in working through this book at a two-puzzle-per-week pace (excepting weeks when we have exams and presentations). Mondays will be a time to discuss each set of two puzzles. Examinations will include problems similar in spirit to the puzzles.

Discussions You will be organized into groups for weekly email discussions. Original submissions are due by 11:59 PM Thursday each week, prior to our Friday discussions. You then have until 11:59 PM Sunday night to reply to postings by other members of your group. Conscientious efforts on Thursday postings are worth three points. Replies to others’ postings are worth one point each. Be certain to include all members of your group on each message and to include me also so you can get credit for the posting. These discussions will take place on hushmail.com. Discussion groups will be realigned after each exam, based primarily on participation. Postings should be thoughtful commentary or opinions on topics relevant to the course. Difficulties with practicums, how busy you are, why your boyfriend/girlfiend is mad at you, or what party you went to last night are not relevant topics. Discussions of topics described in Singh, thoughts on new mathematics, revelations from practicums or plot twists in Cryptonomicom are relevant. Your postings do not need to be excessively long, a normal-sized paragraph per point is a good guideline.

Position Paper A major portion of this course will be a research project on some public-policy or societal aspect of cryptology. It will include both written and oral presentations, along with early drafts. A more detailed description of the assignment will be distributed with due dates. No portion of this project will be accepted late.

Examinations There will be three exams -- see the attached sheet for tentative dates. One of these is the final exam, which will be given at 8 AM on Wednesday, May 1. The final exam cannot be given at any other time, so be certain that you do not make any travel plans that conflict, and also be aware that I will allow you to work longer on the final exam than just the two-hour scheduled block of time. The exams neatly divide the course into three portions. Part I is classical cryptology and the basic mathematics required for both classical and modern cryptology. Part II considers modern cryptology, since the revolutionary events of the 1970’s. Part III considers the societal and public-policy issure wrought by the combination of advanced cryptology, cheap computers and ubiquitous networks.

Grades Grades will be based on the following recipe: Discussions -- 1 part; Practicums -- 2 parts; Research Project -- 2 parts; Exams -- 3 parts. Attendance and improvement will be considered for borderline grades. Scores will be posted on the World Wide Web at
http://buzzard.ups.edu/courses.html. No work will be accepted late. A reminder about withdrawals -- a Withdrawal Passing grade (W) can only be given during the third or fourth weeks of the semester, after that time (barring unusual circumstances), the appropriate grade is a Withdrawal Failing (WF), even if your work has been of passing quality. See the attached schedule for the last day to drop with an automatic ‘W’ and please read The Logger about these often misunderstood grades.

Electronic Mail This course has many components and many small assignments. Much of the course is also about electronic communications. So we will be sending each other a lot of email. I have three addresses I will read for this course, as described in Practicum EM. Please be careful about what you send me, and where you send it. If using a non-UPS email system please identify your real name someplace (header or body of the message). In particular, do not send me attachements unless it is absolutely necessary and try to avoid sending email in HTML format.

Attendance Daily attendance is required and expected, and is a pretty good idea.

Syllabus Please read the distributed syllabus for a discussion of the purpose of this course -- both as a freshman seminar within the core curriculum and as a course in cryptology for the educated citizen.

Tentative Daily Schedule

Part I Classical Cryptology
   
Monday Wednesday Friday
Jan 17
MLK Day
Jan 19
Syllabus
Preview EM
Jan 21
Singh, Chap 1
Practicum EM Due
   
Jan 24
Puzzles to p. 55
Preview STEG
Jan 26
Beezer
Chap DGCD, MA
Jan 28
Singh, Chap 2
Practicum STEG Due
   
Jan 31
Puzzles to p. 59
Preview MONO
Feb 2
Beezer, Chap B
Feb 4
Singh, Chap 3
Practicum MONO Due
   
Feb 7
Puzzles to p. 63
Preview VIG
Feb 9
Beezer, Chap BA, SS
Feb 11
Singh, Chap 4
Practicum VIG Due
   
Feb 14
Puzzles to p. 67
Preview PONT
Last day to drop
Feb 16
Beezer, Chap DL
Feb 18
Singh, Chap 5
Practicum PONT Due
   
Part II Classical Cryptology
   
Feb 21
Exam #1
Classical Cryptology
Feb 23
Beezer, Chap NT
Feb 25
Singh, Chap 6
   
Feb 28
Puzzles to p. 71
Preview SDES
Mar 2
Beezer, Chap DHKE
Key Exchange Worksheet
Mar 4
Singh, Chap 7
Practicum SDES Due
   
Mar 7
Puzzles to p. 74
Preview PGP1
Mar 9
Beezer, Chap DHKS
Knapsack Worksheet
Mar 11
Levy, First Half
Practicum PGP1 Due
   
Mid-Term

Monday Wednesday Friday
Mar 21
Puzzles to p. 77
Preview PGP2
Mar 23
Beezer, Chap RSA
RSA Worksheet
Mar 25
Levy, Second Half
Practicum PGP2 Due
   
Mar 28
Puzzles to p. 81
Preview PGP3
Mar 30
Singh, Chap 8
Apr 1
Quantum Worksheet
Practicum PGP3 Due
   
Part III Society, Public Policy, Cryptology
   
Apr 4
Exam #2
Modern Cryptology
Apr 6
Policy: Free Crypto?
Apr 8
Policy: DRM
   
Apr 11
Puzzles to p. 85
Preview TIME
Apr 13
Policy: Patriot Act
Apr 15
Policy: NSA
Practicum TIME Due
   
Apr 18
Puzzles to p. 89
Preview ANON
Apr 20
Policy: Key Escrow
Apr 22
Policy: Computer Security
Schneier
Practicum ANON Due
   
Apr 25
Position Paper
Presentations
Apr 27
Position Paper
Presentations
Apr 29
Position Paper
Presentations
   
May 2
Position Paper
Presentations
May 4
Position Paper
Presentations
   
Final Examinations
8 AM, Wednesday, May 11