This course will focus on the concepts and applications of cryptography, covering topics on symmetric and asymmetric cryptography; secret key and key exchange; stream and block ciphers; message digests; public and private keys; digital signatures, digital certificates and Public Key Infrastructure (PKI); SSL, IPSec VPN's, S/MIME, PGP and WEP/WPA; cryptographic and non-cryptographic attacks; randomness and primality; cryptographic algorithms (DES, 3DES, AES, Blowfish, RSA, DSA, DH, El Gamal, ECC, MD5, SHA, RC4, etc.); and authentication, confidentiality, integrity and non-repudiation. Introduction to real-world use and applications will be included.
- Admission to a Forensic credential program or permission of the Program Coordinator.
- Not offered this term
- This course is not offered this term. Please check back next term or subscribe to receive notifications of future course offerings and other opportunities to learn more about this course and related programs.
Upon successful completion of this course, the student will be able to:
- Discuss the major trends in cryptographic evolution, including legal and ethical issues.
- Compare the strengths and weaknesses of symmetric and asymmetric algorithms, of message digest implementations, and of various cipher modes.
- Design a simple public key algorithm.
- Assess the strengths and weaknesses of cryptographic algorithms, such as DES, 3DES, AES, RSA, DSS, ECC, DH, RC4, etc.
- Discuss secure implementations of practical real-world cryptographic systems such as EFS, Entrust Client, Wireless, S/MIME, SSL, PGP, VPN's, Smartcards and SSH.
- Assess public and secret key algorithms to determine their vulnerability to common methods of attack.
- Critically evaluate cryptographic solutions in terms of the cryptographic assurances they provide, the method of implementation, their adherence to standards, and their potential weaknesses.
- Use cryptographic tools and solutions, including S/MIME, OpenSSL, PGP and PKI.
- Explain the need for secure key exchange and management, and the various techniques available.
- Compare the strengths and weaknesses of network-based (PGP) and hierarchical PKI systems (X509).
Effective as of Fall 2009
If you have a question or comment about this course, please complete and submit the form below.
Interested in being notified about future offerings of Encryption (FSCT 8580)? If so, fill out the information below and we'll notify you by email when courses for each new term are displayed here.
Programs and courses are subject to change without notice.