- Cryptographic applications
- Classical ciphers and their analysis
- Symmetric key cryptography
- Block ciphers
- Stream ciphers
- Modes of operations
- Cryptographic hash functions
- Message authentication codes
- Public key cryptography
- Encryption and digital signature schemes
- Key agreement protocols
- Real life deployments and standardization efforts
Learning Objectives
- Define the security of fundamental cryptographic primitives and systems.
- Analyze security of symmetric and public key schemes, hash functions, message authentication codes and cryptographic protocols.
- Define and apply generic cryptanalysis methods including brute force, frequency analysis, meet-in-the-middle.
- Examine symmetric key encryption functions: Classical ciphers, stream ciphers, block ciphers.
- Identify applications and real-life deployment of cryptographic constructions.
- Develop software skills for implementing cryptographic algorithms and for analyzing their security.
- State basic probabilistic and statistical notions and apply this knowledge in cryptanalysis.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Training, Education, and Awareness
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.