Welcome to Introduction to Cryptography and Security Risk
Goal:
This course aims to familiarize students with the fundamental concepts and applications of cryptography.
Important things should be known after studying this course:
This course aims to familiarize students with the fundamental concepts and applications of cryptography.
Important things should be known after studying this course:
* Describe the terminology and
fundamental concepts pertaining to the domains of cryptography
and steganography.
and steganography.
* Demonstrate the understanding of various classical substitution and
transposition ciphers
(including Caesar cipher, ROT13, ATBASH and Columnar cipher), and various types of
classical substitution ciphers i.e. Simple, Homophonic, Polygram and Poly-alphabetic.
(including Caesar cipher, ROT13, ATBASH and Columnar cipher), and various types of
classical substitution ciphers i.e. Simple, Homophonic, Polygram and Poly-alphabetic.
* Compare and contrast symmetric, asymmetric and hybrid cryptosystems in terms of
their
functionality, types, strengths and weaknesses.
functionality, types, strengths and weaknesses.
* Express the understanding of the goals of data integrity, authentication and
non-repudiation and how one-way hash functions, message authentication codes
and digital signatures can be used to achieve these goals.
* Discuss the operation and unique strengths of one-time pad, and how
pseudo-random key
streams limit the implementation of one-time pad in computers.
streams limit the implementation of one-time pad in computers.
* Describe the concepts of certification authority (CA) and digital certificates.
* Demonstrate the understanding of DES, Triple-DES and AES, along with the modes
of
operation of symmetric-key ciphers.
operation of symmetric-key ciphers.
* Demonstrate basic understanding of the functionality of RSA.
* Use
cryptographic tools and utilities to comprehend the real-world application of
symmetric,
asymmetric and hybrid cryptosystems.
asymmetric and hybrid cryptosystems.
IT Society blog Team
Post a Comment