While covering the theory of computer communications security, the course will focus on using and in some cases implementing various algorithms. For example, assignments will include using PGP, ssh, and S/MIME, generating personal RSA keys, obtaining and using SSL certificates, and sending/receiving encrypted and digitally signed mail.
1. | Overview |
2. | Classical Encryption Techniques |
3. | Block Ciphers and the Data Encryption Standard |
4. | Basic Concepts in Number Theory and Finite Fields |
5. | Advanced Encryption Standard |
6. | Block Cipher Operation |
7. | Pseudorandom Number Generation and Stream Ciphers |
8. | More Number Theory |
9. | Public-Key Cryptography and RSA |
10. | Other Public-Key Cryptosystems |
11. | Cryptographic Hash Functions |
12. | Message Authentication Codes |
13. | Digital Signatures |
14. | Key Management and Distribution |
15. | User Authentication Protocols |
16. | Transport-Level Security |
17. | Wireless Network Security |
18. | Electronic Mail Security |
19. | IP Security |