BCIT is planning for a substantial return to on-campus activity for the fall 2021 term as informed by BC Public Health Officer guidelines. Refer to each course listing for details.
This course teaches students the art and science of securing data (information). Course components will cover Cryptography with an introduction to Cryptanalysis, with an emphasis on the practical implementation of Cryptographic algorithms and techniques. Topics in Cryptography will include substitution and transposition ciphers, including stream and block ciphers. Applications will include bit-manipulation ciphers, secret and public-key ciphers. Topics in Cryptanalysis will include traditional techniques such as Ciphertext-only, Known-plaintext, and Chosen-plaintext attacks. Students will also be introduced to more modern linear and differential cryptanalysis. Students will be permitted to choose programming languages of their choice in the implementation of algorithms during assignments and final projects.
This course will be offered online in the Winter 2022 term. 1. Please email firstname.lastname@example.org for departmental approval. Include your student number (A0#), course number (COMP__) and preferred CRN. 2. This is a CST BTech course. CST BTech courses are also open to non-bachelor program students. 3. CST Bachelor program students have up to seven (7) years to complete the Bachelor program starting from the date of their first Technical degree-level course or the date of acceptance to the Bachelor program, WHICHEVER COMES FIRST.
Upon successful completion of this course, the student will be able to:
Explain the mathematical foundations of cryptography and the importance of pseudo-random number generators.
Demonstrate use of cryptographic protocols.
Evaluate and analyze the various cryptographic techniques such as key management algorithms, symmetric and asymmetric algorithms, hashes and signatures.
Apply various cryptanalysis techniques to retrieve plaintext messages from ciphertext.
Explain the basics of strong cryptographic algorithms and their applications.
Analyze and evaluate cryptographic algorithms for potential use within an organization.
Configure and deploy cryptographic tools for applications such as email, securing sensitive files, etc.
Implement any of the algorithms covered in the course using any programming language of choice.
Effective as of Fall 2018
COMP 7402 is offered as a part of the following programs:
If you have a comment or question about this course, please complete and submit the form below.
Interested in being notified about future offerings of COMP 7402 - Topics in Computer Programming - Cryptology?
If so, fill out the information below and we'll notify you by email when courses for each new term are displayed here.