Aegis School of Business, Data Science, Cyber Security & Telecommunication
|Application fee:||13.34 USD|
|Course fee:||466.9 USD|
This course focuses on how cryptographic algorithms and associated protocols work; and their implementation. It covers the concepts of block ciphers and message authentication codes, public key encryption, digital signatures, and key establishment, as well as common examples and uses of such schemes; including the AES, RSA-OAEP, and the Digital Signature Algorithm. Basic cryptanalytic techniques and examples of practical security solutions are explored to understand the design, evaluation and deployment of state-of-the-art cryptography and encryption applications.
• To understand the fundamentals of cryptography
• To standard block cipher techniques and threats
• To understand public key infrastructure (PKI) and associated algorithms.
• To understand and implement digital signature technology
• History of cryptography
• One time pad and stream ciphers
• Block Ciphers, abstractions, pseudo random permutations and functions
• Attacks on block ciphers
• Message Integrity: definition and applications
• Pseudo-random generators
• Collision resistant hashing
• Authenticated encryption: Security against active attacks
• Public key cryptography: arithmetic modulo primes, One-way functions. Trapdoor one-way functions, cryptography using arithmetic modulo primes
• Public key encryption, RSA-OAEP, Diffie-Hellman, ElGamal, and elliptic curve cryptosystems.
• Arithmetic modulo composites
• Digital Signatures: definitions and applications
• Auxiliary signature schemes and applications
• Identification protocols
• Authenticated key exchange and SSL/TLS session setup
• Zero knowledge protocols