COURSE OBJECTIVES

This course describes the concept of cryptography, uses the classical encryption techniques, illustrates the
mathematical model of symmetric encryption schemes, explains the mathematical model of asymmetric/public
key encryption schemes, and elaborates the mathematical model of authentication schemes such as MAC and
Hash algorithms.

COURSE LEARNING OUTCOMES (CLO)

CLO: 1. Describe the basic data security algorithms and techniques. [C1 – Knowledge]
CLO: 2. Identify the suitable cryptography algorithm for a network application. [C2 – Analysis]
CLO: 3. Apply the knowledge appropriate to the discipline, particularly in the field of data security. [C3 – Application]


COURSE CONTENTS


• Fundamental security design principal
• OSI security architecture
• Stream cipher techniques
• Block cipher structure
• DES
• AES, Triple DES
• Pseudo-random number generation, RSA
• Elliptic curve
• SHA, HMAC
• Digital signatures
• S/MIME
• DNSSEC
• SSL/TLS
• HTTPS, SSH