{"id":564,"date":"2024-04-20T19:48:07","date_gmt":"2024-04-20T19:48:07","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/?page_id=564"},"modified":"2024-04-20T20:26:13","modified_gmt":"2024-04-20T20:26:13","slug":"cs-463","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/cs-463\/","title":{"rendered":"CS 463 &#8211; CRYPTOGRAPHY FOR CYBERSECURITY"},"content":{"rendered":"\n<p><strong>CRYPTOGRAPHY FOR CYBERSECURITY<\/strong><\/p>\n\n\n\n<p>After completing this 3-credit course, students should have strong mathematical foundations including information theory, number theory, factoring, and prime number generation; cryptographic protocols including basic building blocks and protocols; cryptographic techniques including key generation and key management, and applications; cryptographic algorithms including DES, AES, Stream Ciphers, Hash functions, digital signatures, and more.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Course Objectives<\/h3>\n\n\n\n<p>Upon successful completion of this course, students will:<\/p>\n\n\n\n<ol>\n<li>Recognize the general purpose and goals of the online course<\/li>\n\n\n\n<li>Explain functionality of current cryptographic techniques<\/li>\n\n\n\n<li>Identify basic mathematical techniques underlying cryptology<\/li>\n\n\n\n<li>Evaluate the computational and memory needs of cryptographic techniques<\/li>\n\n\n\n<li>Measure the security strengths and risks of cryptographic techniques<\/li>\n\n\n\n<li>Discern implications of hardware and software implementations of cryptographic techniques<\/li>\n\n\n\n<li>Analyze and critique new cryptographic protocols<\/li>\n\n\n\n<li>Analyze applications in terms of security needs<\/li>\n\n\n\n<li>Match the security needs of application with appropriate cryptographic techniques<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>CRYPTOGRAPHY FOR CYBERSECURITY After completing this 3-credit course, students should have strong mathematical foundations including information theory, number theory, factoring, and prime number generation; cryptographic protocols including basic building blocks and protocols; cryptographic techniques including key generation and key management, and applications; cryptographic algorithms including DES, AES, Stream Ciphers, Hash functions, digital signatures, and more&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/brandon-pearson\/cs-463\/\">Read More<\/a><\/div>\n","protected":false},"author":24668,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/pages\/564"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/users\/24668"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/comments?post=564"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/pages\/564\/revisions"}],"predecessor-version":[{"id":638,"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/pages\/564\/revisions\/638"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/media?parent=564"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}