MSCS: CYB 502 – Cryptography
Categories: MS in Computer Science
About Course
- This course provides a comprehensive introduction to the fundamental algorithms and protocols used in cryptography for securing data.
- Students will explore the theoretical foundations and practical applications of cryptographic techniques, including symmetric and asymmetric encryption, hashing, digital signatures, and cryptographic protocols.
- The course emphasizes both the mathematical underpinnings of cryptography and its real-world applications in securing communications, data, and systems.
Course Objectives
- Understand the fundamental principles of cryptography and its role in securing information.
- Analyze and implement various cryptographic algorithms, including symmetric and asymmetric encryption.
- Explore cryptographic protocols such as digital signatures, key exchange, and public key infrastructure.
- Evaluate the security of cryptographic systems and their resistance to attacks.
Course Content
Week 1: Introduction to Cryptography
-
Introduction to Cryptography
-
LO1: Explain the historical evolution of cryptography and its influence on modern security practices.
-
LO2: Define fundamental cryptographic terminology such as plaintext, ciphertext, cipher, and key.
-
LO3: Describe the role of cryptography in ensuring confidentiality, integrity, and authentication in digital systems.
-
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 2: Mathematical Foundations of Cryptography
-
Mathematical Foundations of Cryptography
-
LO1: Apply number-theoretic operations such as modular arithmetic and GCD computations to cryptographic problems.
-
LO2: Analyze properties of prime numbers and their relevance in generating secure cryptographic keys.
-
LO3: Explain how mathematical functions enable secure encryption algorithms.
-
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 3: Symmetric Key Cryptography
-
Symmetric Key Cryptography
-
LO1: Compare DES, AES, and stream ciphers in terms of structure, security level, and performance.
-
LO2: Demonstrate how block cipher modes of operation influence security and functionality.
-
LO3: Analyze the strengths and vulnerabilities of symmetric key systems using examples from modern applications.
-
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 4: Public Key Cryptography
-
Public Key Cryptography
-
LO1: Explain the mathematical principles underlying RSA, Diffie-Hellman, and elliptic-curve cryptography.
-
LO2: Evaluate the strengths and weaknesses of public key systems compared to symmetric key systems.
-
LO3: Apply key-exchange and public-key encryption methods to solve real-world communication security scenarios
-
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 5: Hash Functions and Message Integrity
-
Hash Functions and Message Integrity
-
LO1: Describe the characteristics of cryptographic hash functions and their role in ensuring data integrity.
-
LO2: Compare MD5, SHA family, and HMAC based on collision resistance and security properties.
-
LO3: Analyze how digital signatures integrate hashing and public key cryptography to verify authenticity.
-
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 6: Cryptographic Protocols
-
Cryptographic Protocols
-
LO1: Explain the functions of cryptographic protocols in securing authentication, key management, and communication.
-
LO2: Analyze real-world protocol examples such as SSL/TLS to identify their components and security guarantees.
-
LO3: Design simple protocol sequences illustrating secure communication between entities.
-
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 7: Digital Signatures and Certificates
-
Digital Signatures and Certificates
-
LO1: Describe the workflow of digital signatures and their role in ensuring non-repudiation.
-
LO2: Explain the structure and purpose of PKI and certificates issued by Certificate Authorities.
-
LO3: Evaluate digital signature algorithms in terms of performance and security.
-
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 8: Midterm
-
Midterm Test
-
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 9: Advanced Cryptographic Techniques
-
Advanced Cryptographic Techniques
-
LO1: Explain the principles of zero-knowledge proofs and their application in privacy-preserving authentication.
-
LO2: Analyze the functionality and potential of homomorphic encryption for secure data processing.
-
LO3: Evaluate quantum-resistant algorithms in terms of emerging threats, referencing NIST post-quantum standards.
-
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 10: Cryptanalysis and Attack Techniques
-
Cryptanalysis and Attack Techniques
-
LO1: Identify and describe common cryptanalytic techniques such as brute force, linear, and differential attacks.
-
LO2: Analyze the susceptibility of various cryptographic algorithms to known attack methods.
-
LO3: Evaluate real-world case studies of cryptographic failures to determine causes and preventive strategies.
-
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 11: Secure Multiparty Computation
-
Secure Multiparty Computation
-
LO1: Explain the goals and principles behind secure multiparty computation (MPC).
-
LO2: Describe how MPC protocols enable secure collaborative computation without revealing private inputs.
-
LO3: Analyze use-cases where MPC enhances privacy and data security in distributed environments.
-
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 12: Blockchain and Cryptocurrencies
-
Blockchain and Cryptocurrencies
-
LO1: Describe how cryptographic primitives enable blockchain security.
-
LO2: Explain the functioning of consensus mechanisms such as Proof of Work and Proof of Stake.
-
LO3: Analyze the cryptographic foundations of cryptocurrencies and evaluate their security assumptions.
-
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 13: Cryptography in Modern Applications
-
Cryptography in Modern Applications
-
LO1: Explain how cryptography supports secure operations in IoT, cloud platforms, and mobile ecosystems.
-
LO2: Analyze encryption-based access control and data protection strategies in modern digital environments.
-
LO3: Evaluate the challenges of implementing cryptography in resource-constrained devices
-
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 14: Legal and Ethical Issues in Cryptography
-
Legal and Ethical Issues in Cryptography
-
LO1: Describe major legal regulations and compliance requirements governing cryptographic use and export control.
-
LO2: Analyze ethical considerations related to encryption, surveillance, and privacy rights.
-
LO3: Evaluate real-world ethical case studies to demonstrate responsible use of cryptographic technologies.
-
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 15: Review and Future Directions in Cryptography
-
Review and Future Directions in Cryptography
-
LO1: Summarize key cryptographic concepts learned throughout the course and their interrelationships.
-
LO2: Evaluate emerging trends such as post-quantum cryptography and advanced protocol design.
-
LO3: Reflect on future challenges in secure communications and data protection, drawing from textbook insights.
-
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation
Week 16: Final Test
-
Week 16: Final Test
-
Multiple Choice Questions
-
True/False Questions
-
Scenario-Based Multiple Choice Questions
-
Key Terms and Concepts Questions
-
Short Answer Questions
-
Written Assignment
-
Presentation Task
-
Role-Playing Activity
-
Peer Review Task
-
Exercises and Activities Adaptation