Directories and Search

Course Search


Courses may be offered in one of the following modalities:

  • Traditional in-person courses (0–29 percent of coursework is delivered online, the majority being offered in person.)
  • Hybrid/blended courses (30–79 percent of coursework is delivered online.)
  • Online courses (100 percent of coursework is delivered online, either synchronously on a designated day and time or asynchronously as a deadline-driven course.)
  • Hyflex (Students will be assigned to attend in-person or live streamed sessions as a reduced-size cohort on a rotating basis; live sessions are also recorded, offering students the option to participate synchronously or view asynchronously as needed.)

If you are enrolled in courses delivered in traditional or hybrid modalities, you will be expected to attend face-to-face instruction as scheduled.


CSC 381: Applied Cryptography

3 credits

Applied Cryptography plays a critical role in information security because it is the study of protocols to overcome malicious attempts to compromise computer security. The course will allow students to use cryptography to analyze and develop more secure and robust applications. Students will understand the implementation challenges associated with cryptosystems.

Learning Goals

Upon completion of the course, students will be able to:1. Recognize historic milestones in the development of the field of cryptography.2. Articulate, explain and select basic cryptographic techniques, given a specific situation.3. Articulate, explain and select basic cryptanalysis techniques, given a specific situation.4. Articulate and explain details of symmetric cryptographic systems, and identify strengths, weaknesses, and implementation challenges.5. Articulate and explain details of asymmetric cryptographic systems, and identify strength, weaknesses, and implementation challenges.6. Articulate and explain details of stream ciphers, and identify their strengths, weaknesses, and implementation challenges, and to implement (parts of) these algorithms in computer code.7. Describe details of cryptographic algorithms DES and AES, and implement (parts of) these algorithms in computer code.8. Explain and describe properties of message digests and hashing algorithms, and implement computer code using these algorithms.9. Explain the concepts underlying Transport Layer Security (TLS)

*The learning goals displayed here are those for one section of this course as offered in a recent semester, and are provided for the purpose of information only. The exact learning goals for each course section in a specific semester will be stated on the syllabus distributed at the start of the semester, and may differ in wording and emphasis from those shown here.

Sections Offered: Spring 2024

Applied Cryptography
0145-381-001 S. Kim Mon/Wed 9:25 am - 10:40 am GC - SWL 101 3

 
Apply Now
Request Information