Saturday, February 14, 2015

Welcome to Introduction to Cryptography and Security Risk






 Welcome to Introduction to Cryptography and Security Risk


Goal:
This course aims to familiarize students with the fundamental concepts and applications of cryptography.

Important things should be known after studying this course:
     * Describe the terminology and fundamental concepts pertaining to the domains of cryptography
        and steganography.
     * Demonstrate the understanding of various classical substitution and transposition ciphers
        (including    Caesar cipher, ROT13, ATBASH and Columnar cipher), and various types of
        classical substitution ciphers i.e. Simple, Homophonic, Polygram and Poly-alphabetic.
     * Compare and contrast symmetric, asymmetric and hybrid cryptosystems in terms of their
        functionality, types, strengths and weaknesses.
     * Express the understanding of the goals of data integrity, authentication and non-repudiation and           how one-way hash functions, message authentication codes and digital signatures can be used to         achieve these goals.
     * Discuss the operation and unique strengths of one-time pad, and how pseudo-random key
        streams limit the implementation of one-time pad in computers.
     * Describe the concepts of certification authority (CA) and digital certificates.
     * Demonstrate the understanding of DES, Triple-DES and AES, along with the modes of
        operation of symmetric-key ciphers.
     * Demonstrate basic understanding of the functionality of RSA.
     * Use cryptographic tools and utilities to comprehend the real-world application of symmetric,
        asymmetric and hybrid cryptosystems.



IT Society blog Team

About the Author

Saed Said Al-badri

Author & Editor

Student in Al-Musanna College of Technology, Stay tuned for the new !!!

Post a Comment

 
IT Society ©