MSCS: CYB 502 – Cryptography

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

  • This course provides a comprehensive introduction to the fundamental algorithms and protocols used in cryptography for securing data.
  • Students will explore the theoretical foundations and practical applications of cryptographic techniques, including symmetric and asymmetric encryption, hashing, digital signatures, and cryptographic protocols.
  • The course emphasizes both the mathematical underpinnings of cryptography and its real-world applications in securing communications, data, and systems.

Course Objectives

  • Understand the fundamental principles of cryptography and its role in securing information.
  • Analyze and implement various cryptographic algorithms, including symmetric and asymmetric encryption.
  • Explore cryptographic protocols such as digital signatures, key exchange, and public key infrastructure.
  • Evaluate the security of cryptographic systems and their resistance to attacks.
Show More

Course Content

Week 1: Introduction to Cryptography

  • Introduction to Cryptography
  • LO1: Explain the historical evolution of cryptography and its influence on modern security practices.
  • LO2: Define fundamental cryptographic terminology such as plaintext, ciphertext, cipher, and key.
  • LO3: Describe the role of cryptography in ensuring confidentiality, integrity, and authentication in digital systems.
  • Multiple Choice Questions
  • True/False Questions
  • Scenario-Based Multiple Choice Questions
  • Key Terms and Concepts Questions
  • Short Answer Questions
  • Written Assignment
  • Presentation Task
  • Role-Playing Activity
  • Peer Review Task
  • Exercises and Activities Adaptation

Week 2: Mathematical Foundations of Cryptography

Week 3: Symmetric Key Cryptography

Week 4: Public Key Cryptography

Week 5: Hash Functions and Message Integrity

Week 6: Cryptographic Protocols

Week 7: Digital Signatures and Certificates

Week 8: Midterm

Week 9: Advanced Cryptographic Techniques

Week 10: Cryptanalysis and Attack Techniques

Week 11: Secure Multiparty Computation

Week 12: Blockchain and Cryptocurrencies

Week 13: Cryptography in Modern Applications

Week 14: Legal and Ethical Issues in Cryptography

Week 15: Review and Future Directions in Cryptography

Week 16: Final Test

Want to receive push notifications for all major on-site activities?