Department of Electrical and Computer Engineering George Mason University Volgenau School of IT & Engineering

General Information

Discusses complex cryptographic algorithms and their implementations in software and hardware. Provides mathematical background necessary to understand, implement, and break modern cryptoalgorithms. Covers implementations of cryptosystems using smart cards, network processors, and other platforms. Discusses side channel attacks against implementations of cryptography, including timing attacks, power analysis, fault analysis, cache attacks, etc. Introduces advanced topics, such as random and pseudorandom number generators, secret sharing, zero-knowledge, and identity based encryption. Requires a semester-long project devoted to implementation of selected algorithms or protocols in software or hardware, and/or comparative analysis of various algorithms, protocols, or implementations.

Lectures Tuesday 4:30 pm -7:10 pm in Robinson Hall A 208


  • Class Schedule Updated 1/27/13: (pdf)
  • Syllabus Updated 1/27/13: (pdf)


Dr. Jens-Peter Kaps
Office: Engineering Building, Room 3222
Email: jkaps'at'

Office Hours

  • Monday 1:00 pm to 2:00 pm
  • Tuesday 2:00 pm to 3:00 pm

Additional office hours are by appointment only (see the Contact page for how to setup an appointment).


Cryptography and Network Security: Principles and Practice by William Stallings, Prentice Hall; 5th edition, 2010, ISBN: 978-0-13-609704-4

Handbook of Applied Cryptography by Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone, CRC Press, Inc.; 1996, ISBN: 0-84-938523-7. (all chapters of this book can be downloaded from the book web page)

You can find links to more interesting books on the Literature page.