CRYPTOGRAPHY FOR CYBERSECURITY
After completing this 3-credit course, students should have strong mathematical foundations including information theory, number theory, factoring, and prime number generation; cryptographic protocols including basic building blocks and protocols; cryptographic techniques including key generation and key management, and applications; cryptographic algorithms including DES, AES, Stream Ciphers, Hash functions, digital signatures, and more.
Course Objectives
Upon successful completion of this course, students will:
- Recognize the general purpose and goals of the online course
- Explain functionality of current cryptographic techniques
- Identify basic mathematical techniques underlying cryptology
- Evaluate the computational and memory needs of cryptographic techniques
- Measure the security strengths and risks of cryptographic techniques
- Discern implications of hardware and software implementations of cryptographic techniques
- Analyze and critique new cryptographic protocols
- Analyze applications in terms of security needs
- Match the security needs of application with appropriate cryptographic techniques