This is an introduction to cryptology with a focus on applied cryptology. It was designed to be accessible to a wide audience, and therefore does not include a rigorous mathematical foundation (this will be covered in later classes). The class format is lecture and discussion. This class covers the following at a high level:
- Intro to cryptology, cryptography, cryptanalysis
- Overview of cryptography
- Symmetric cryptography
- Asymmetric cryptography
- Overview of adversary capabilities
- Overview of types of attacks
- Case studies of real attacks on real systems
- Understand the differences and relationships between "cryptology", "cryptography", and "cryptanalysis.”
- Understand the role of cryptography in computer security and information assurance.
- Understand the core concepts of cryptographic algorithms.
- Understand classes of symmetric and asymmetric algorithms, and when each is appropriate.
- Understand different adversarial models, relative difficulty, and how they might manifest in the real world.
- Understand what it means for an algorithm to be "secure" and "broken."
- Identify cryptographic standards organizations.