MATH 316 Spring 2013 Protecting Information: Applications of Abstract Algebra and Quantum Physics (Q)

Cross Listed as PHYS316
Living in the information age, we find ourselves depending more and more on codes that protect messages against either noise or eavesdropping. This course examines some of the most important codes currently being used to protect information, including linear codes, which in addition to being mathematically elegant are the most practical codes for error correction, and the RSA public key cryptographic scheme, popular nowadays for internet applications. We also study the standard AES system as well as an increasingly popular cryptographic strategy based on elliptic curves. Looking ahead by a decade or more, we show how a quantum computer could crack the RSA scheme in short order, and how quantum cryptographic devices will achieve security through the inherent unpredictability of quantum events.
Class Format: lecture
Requirements/Evaluation: evaluation will be based on homework sets and exams
Additional Info:
Additional Info2:
Prerequisites: Physics 210 or Mathematics 211 (possibly concurrent) or permission of the instructors; students not satisfying the course prerequisites but who have completed Mathematics 209 or Mathematics 251 are particularly encouraged to ask to be admitted
Enrollment Preference: discretion of the instructors
Department Notes:
Material and Lab Fees:
Distribution Notes:
Divisional Attributes: Division III,Quantitative and Formal Reasoning
Other Attributes:
Enrollment Limit: 50
Expected Enrollment: 35
Class Number: 3222
MATH316-01(S) LEC Protecting Information (Q) Division 3: Science and MathematicsQuantitative and Formal Reasoning Susan R. Loepp
, William K. Wootters
MWF 09:00 AM-09:50 AM Physics 205 3222
Course Search
Catalog Number:
Subject Attributes:
Enrollment Limit:
Course Type:
Start Time: End Time:
Instructor First Name:
Instructor Last Name:
Keyword Search: