After completing this 3-credit course, students should have strong mathematical foundations including information theory, number theory, factoring, and prime number generation; cryptographic protocols including basic building blocks and protocols; cryptographic techniques including key generation and key management, and applications; cryptographic algorithms including DES, AES, Stream Ciphers, Hash functions, digital signatures, and more.
Course Objectives
Upon successful completion of this course, students will:
- Recognize the general purpose and goals of the online course
- Explain functionality of current cryptographic techniques
- Identify basic mathematical techniques underlying cryptology
- Evaluate the computational and memory needs of cryptographic techniques
- Measure the security strengths and risks of cryptographic techniques
- Discern implications of hardware and software implementations of cryptographic techniques
- Analyze and critique new cryptographic protocols
- Analyze applications in terms of security needs
- Match the security needs of application with appropriate cryptographic techniques
Course Materials
Stream ciphers and DES
AES
More on Block Ciphers
PKI, RSA
Diffie-Hellman, Elgamal
Elliptic Curves
Digital Signatures and Message Authentication codes
Hash Functions
Key generation and management