Skip to main content

Encryption FSCT 8580

Forensic Investigation Part-time Studies Course

Course details

This course will focus on the concepts and applications of cryptography, covering topics on symmetric and asymmetric cryptography; secret key and key exchange; stream and block ciphers; message digests; public and private keys; digital signatures, digital certificates and Public Key Infrastructure (PKI); SSL, IPSec VPN's, S/MIME, PGP and WEP/WPA; cryptographic and non-cryptographic attacks; randomness and primality; cryptographic algorithms (DES, 3DES, AES, Blowfish, RSA, DSA, DH, El Gamal, ECC, MD5, SHA, RC4, etc.); and authentication, confidentiality, integrity and non-repudiation. Introduction to real-world use and applications will be included.


  • Admission to a Forensic credential program or permission of the Program Coordinator.



Not offered this term
This course is not offered this term through BCIT Part-time Studies. Please check back next term or subscribe to receive email updates.

Learning Outcomes

Upon successful completion of this course, the student will be able to:

  • Discuss the major trends in cryptographic evolution, including legal and ethical issues.
  • Compare the strengths and weaknesses of symmetric and asymmetric algorithms, of message digest implementations, and of various cipher modes.
  • Design a simple public key algorithm.
  • Assess the strengths and weaknesses of cryptographic algorithms, such as DES, 3DES, AES, RSA, DSS, ECC, DH, RC4, etc.
  • Discuss secure implementations of practical real-world cryptographic systems such as EFS, Entrust Client, Wireless, S/MIME, SSL, PGP, VPN's, Smartcards and SSH.
  • Assess public and secret key algorithms to determine their vulnerability to common methods of attack.
  • Critically evaluate cryptographic solutions in terms of the cryptographic assurances they provide, the method of implementation, their adherence to standards, and their potential weaknesses.
  • Use cryptographic tools and solutions, including S/MIME, OpenSSL, PGP and PKI.
  • Explain the need for secure key exchange and management, and the various techniques available.
  • Compare the strengths and weaknesses of network-based (PGP) and hierarchical PKI systems (X509).

Effective as of Fall 2009


Interested in being notified about future offerings of Encryption (FSCT 8580)? If so, fill out the information below and we'll notify you by email when courses for each new term are displayed here.

  • Privacy Notice: The information you provide will be used to respond your request for BCIT course information and is collected under Section 26(c) of the Freedom of Information and Protection of Privacy Act (FIPPA). For more information about BCIT’s privacy practices contact: Associate Director, Privacy, Information Access & Policy Management, British Columbia Institute of Technology, 3700 Willingdon Ave. Burnaby, BC V5A 3H2, email: