- Cryptographic applications
- Classical ciphers and their analysis
- Symmetric key cryptography
- Block ciphers
- Stream ciphers
- Modes of operations
- Cryptographic hash functions
- Message authentication codes
- Public key cryptography
- Encryption and digital signature schemes
- Key agreement protocols
- Real life deployments and standardization efforts
- Define the security of fundamental cryptographic primitives and systems.
- Analyze security of symmetric and public key schemes, hash functions, message authentication codes and cryptographic protocols.
- Define and apply generic cryptanalysis methods including brute force, frequency analysis, meet-in-the-middle.
- Examine symmetric key encryption functions: Classical ciphers, stream ciphers, block ciphers.
- Identify applications and real-life deployment of cryptographic constructions.
- Develop software skills for implementing cryptographic algorithms and for analyzing their security.
- State basic probabilistic and statistical notions and apply this knowledge in cryptanalysis.
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.