Directories and Search

Course Search


Courses may be offered in one of the following modalities:

  • Traditional in-person courses (0–29 percent of coursework is delivered online, the majority being offered in person.)
  • Hybrid/blended courses (30–79 percent of coursework is delivered online.)
  • Online courses (100 percent of coursework is delivered online, either synchronously on a designated day and time or asynchronously as a deadline-driven course.)
  • Hyflex (Students will be assigned to attend in-person or live streamed sessions as a reduced-size cohort on a rotating basis; live sessions are also recorded, offering students the option to participate synchronously or view asynchronously as needed.)

If you are enrolled in courses delivered in traditional or hybrid modalities, you will be expected to attend face-to-face instruction as scheduled.


Applied Cryptography (CSC-381)


Semester: Spring 2024
Number: 0145-381-001
Instructor: Sung Kim
Days: Monday Wednesday 9:25 am - 10:40 am
Note: Traditional In-Person Class
Location: Garden City - Swirbul Library 101
Credits: 3
Notes:

Required For All Computer Science Students Wishingto Graduate With A
Concentration In Informationsecurity

Course Materials: View Text Books
Description:

Applied Cryptography plays a critical role in information security because it is the study of protocols to overcome malicious attempts to compromise computer security. The course will allow students to use cryptography to analyze and develop more secure and robust applications. Students will understand the implementation challenges associated with cryptosystems.

Learning Goals:   Upon completion of the course, students will be able to:1. Recognize historic milestones in the development of the field of cryptography.2. Articulate, explain and select basic cryptographic techniques, given a specific situation.3. Articulate, explain and select basic cryptanalysis techniques, given a specific situation.4. Articulate and explain details of symmetric cryptographic systems, and identify strengths, weaknesses, and implementation challenges.5. Articulate and explain details of asymmetric cryptographic systems, and identify strength, weaknesses, and implementation challenges.6. Articulate and explain details of stream ciphers, and identify their strengths, weaknesses, and implementation challenges, and to implement (parts of) these algorithms in computer code.7. Describe details of cryptographic algorithms DES and AES, and implement (parts of) these algorithms in computer code.8. Explain and describe properties of message digests and hashing algorithms, and implement computer code using these algorithms.9. Explain the concepts underlying Transport Layer Security (TLS)

*The learning goals displayed here are those for one section of this course as offered in a recent semester, and are provided for the purpose of information only. The exact learning goals for each course section in a specific semester will be stated on the syllabus distributed at the start of the semester, and may differ in wording and emphasis from those shown here.

Prerequisites:

» View Other Sections of this Course


« Back to Search Results

 
Apply Now
Request Information