COURSE  TITLE  EFF YEAR  EFF TERM  DEPARTMENT  CREDIT HOURS  
MA464  APPLIED ALGEBRA W/ CRYPTOLOGY  2013  2  Mathematical Sciences  3.0 (BS=0.0, ET=0.0, MA=3.0)  
SCOPE  
We study the underlying algebra of computer science structures as well as sets, set functions, Boolean algebra, finite state machines, groups, and modular arithmetic. We introduce and study mathematical aspects of cryptology with an emphasis on cryptanalysis of encryption ciphers. We study early paperandpencil systems through current computer algorithms for encryption. We employ algebraic principles in both design and analysis of encryption systems, be it matrix, linear feedback shift register sequence, or linear congruential random number generator sequence efforts. Further, we investigate the mathematics of breaking machine ciphers and of designing modern publickey crypto systems.  


SPECIAL REQUIREMENTS:  
None 
TYPE  COURSE  EFF YEAR  EFF TERM  TRACK  RED BOOK FLG 
PRE REQUISITE  
MA206  1992  1  1  Y  
MA256  2018  2  2  Y  
MA206X  2017  2  3  Y 
AYT  #SECT/SIZE  CPBLTY  ENRLD  WAIT  SEATS  CLOSED  DETAILS  
2025  2  2  18  36  21  0  15  N  Hours  
2026  2  2  18  36  20  0  16  N  Hours  
2027  1  0  0  0  0  0  0  N  Hours  
2027  2  2  18  36  20  0  16  N  Hours  
2028  1  0  0  0  0  0  0  N  Hours  
2028  2  2  18  36  0  0  36  N  Hours  
COURSE  TITLE  EFF YEAR  EFF TERM  DEPARTMENT  CREDIT HOURS  
MA464  APPLIED ALGEBRA W/ CRYPTOLOGY  2003  2  Mathematical Sciences  3.0 (BS=0.0, ET=0.0, MA=0.0)  
SCOPE  
We study the underlying algebra of computer science structures as well as sets, set functions, Boolean algebra, finite state machines, groups, and modular arithmetic. We introduce and study mathematical aspects of cryptology with an emphasis on cryptanalysis of encryption ciphers. We study early paperandpencil systems through current computer algorithms for encryption. We employ algebraic principles in both design and analysis of encryption systems, be it matrix, linear feedback shift register sequence, or linear congruential random number generator sequence efforts. Further, we investigate the mathematics of breaking machine ciphers and of designing modern publickey crypto systems.  


SPECIAL REQUIREMENTS:  
None 
TYPE  COURSE  EFF YEAR  EFF TERM  TRACK  RED BOOK FLG 
PRE REQUISITE  
MA206  1992  1  1  Y 