This is an introduction to cryptology with a focus on applied cryptology. It was designed to be accessible to a wide audience, and therefore does not include a rigorous mathematical foundation (this will be covered in later classes). The class format is lecture and discussion. This class covers the following at a high level:
Intro to cryptology, cryptography, cryptanalysis
Overview of cryptography
Overview of adversary capabilities
Overview of types of attacks
Case studies of real attacks on real systems
Understand the differences and relationships between "cryptology", "cryptography", and "cryptanalysis.”
Understand the role of cryptography in computer security and information assurance.
Understand the core concepts of cryptographic algorithms.
Understand classes of symmetric and asymmetric algorithms, and when each is appropriate.
Understand different adversarial models, relative difficulty, and how they might manifest in the real world.
Understand what it means for an algorithm to be "secure" and "broken."
Identify cryptographic standards organizations.
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.