This course illustrates where and how cryptography is used. Also addressed are cryptographic algorithms and protocols, and how they are used to protect information in various states. Topics include number theory; types of attacks; and cryptographic modes, protocols and security functions.
- Given an established organization with critical systems, illustrate the elements of a cryptographic system.
- Given the description of an established organization with fully deployed systems needing confidential information access with integrity, sketch the differences between symmetric and asymmetric algorithms.
- Given an established organization needing secure information distribution, employ effective cryptographic protocols, tools and techniques.
- Given an emerging organization's critical systems, set up an effective cryptography architecture, noting strengths and weaknesses, modes, and issues that have to be addressed in an implementation.
- Given an established organization with critical systems, analyze how various cryptographic algorithms and protocols work.
- Given an emerging organization's critical systems, evaluate security mechanisms to be considered based on cryptography.
- Given an established organization's need for secure remote communications and applications utilization; illustrate the application of cryptography in SSL, virtual private networks, secure storage, and other security applications.