Course Overview
Learning Objectives
- Explain the importance of Cryptography as the workhorse in cyber security
- Identify and compare the classical encryption techniques and exploit their vulnerabilities
- Design and employ block ciphers such as DES, 3DES, AES and measure their strengths based on their key size
- Relate the number theory into key generation for asymmetric cryptography and explain RSA
- Compare symmetric and symmetric encryption mechanisms and select appropriate method for each application
- Explain the application of encryption in RSA and authentication methods, HASH, MAC, SHA, and digital signatures
- Implement Suite B algorithms, Data at rest security measure, EC and ID based Crypto techniques
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):