Skip to main content
International Fees

International fees are typically three times the amount of domestic fees. Exact cost will be calculated upon completion of registration.

Course details

This course teaches students the art and science of securing data in the presence of an adversary, namely cryptography. The course begins with the mathematical foundations of cryptography, including pseudo-random number generation, and hence proceeds with a coverage of secret key algorithms and public key algorithms. The students learn the principles of operation of such cryptographic techniques, along with representative algorithms from both fields. The students also learn attack techniques that apply to secret key algorithms and public key algorithms. The course teaches students the design and use of stream ciphers as well. The students learn various schemes to securely manage and exchange cryptographic keys. The students also learn applications of one-way functions to compute and verify hashes and digital signatures. The course also teaches students the principal identification schemes currently in use. Throughout the course, the students also learn the use of various cryptographic tools.

Prerequisite(s)

Credits

3.0

Not offered this term
This course is not offered this term. Please check back next term or subscribe to receive notifications of future course offerings and other opportunities to learn more about this course and related programs.

Learning Outcomes

Upon successful completion of this course, the student will be able to:

  • Discuss the mathematical foundations of cryptography.
  • Analyze pseudo-random number generators.
  • Outline, design, use, and cryptanalyze a symmetric cryptographic algorithm.
  • Outline, design, use, and cryptanalyze an asymmetric cryptographic algorithm.
  • Discuss the inner workings of a stream cipher.
  • Justify and implement key management schemes.
  • Justify and implement key exchange algorithms.
  • Calculate and verify hashes and digital signatures.
  • Apply identification schemes.
  • Apply identification schemes.

Effective as of Winter 2018

Related Programs

Cryptography (FSCT 8581) is offered as a part of the following programs:

  • Indicates programs accepting international students.
  • Indicates programs with a co-op option.

School of Computing and Academic Studies

  1. Forensic Investigation (Digital Forensics and Cybersecurity Option)
    Advanced Certificate Part-time

Contact Us

If you have a question or comment about this course, please complete and submit the form below.

  • Privacy Notice: The information you provide will be used to respond to your request for BCIT program information and is collected under Section 26(c) of the Freedom of Information and Protection of Privacy Act (FIPPA). For more information about BCIT’s privacy practices contact: Associate Director, Privacy, Information Access & Policy Management, British Columbia Institute of Technology, 3700 Willingdon Ave. Burnaby, BC V5G 3H2, email: privacy@bcit.ca.
  • This field is for validation purposes and should be left unchanged.

Subscribe

Interested in being notified about future offerings of Cryptography (FSCT 8581)? If so, fill out the information below and we'll notify you by email when courses for each new term are displayed here.

  • Privacy Notice: The information you provide will be used to respond your request for BCIT course information and is collected under Section 26(c) of the Freedom of Information and Protection of Privacy Act (FIPPA). For more information about BCIT’s privacy practices contact: Associate Director, Privacy, Information Access & Policy Management, British Columbia Institute of Technology, 3700 Willingdon Ave. Burnaby, BC V5A 3H2, email: privacy@bcit.ca.