While covering the theory of computer communications security, the course will focus on using and in some cases implementing various algorithms. For example, assignments will include using PGP, ssh, and S/MIME, generating personal RSA keys, obtaining and using SSL certificates, and sending/receiving encrypted and digitally signed mail.
| 1. | Overview |
| 2. | Classical Encryption Techniques |
| 3. | Block Ciphers and the Data Encryption Standard |
| 4. | Basic Concepts in Number Theory and Finite Fields |
| 5. | Advanced Encryption Standard |
| 6. | Block Cipher Operation |
| 7. | Pseudorandom Number Generation and Stream Ciphers |
| 8. | More Number Theory |
| 9. | Public-Key Cryptography and RSA |
| 10. | Other Public-Key Cryptosystems |
| 11. | Cryptographic Hash Functions |
| 12. | Message Authentication Codes |
| 13. | Digital Signatures |
| 14. | Key Management and Distribution |
| 15. | User Authentication Protocols |
| 16. | Transport-Level Security |
| 17. | Wireless Network Security |
| 18. | Electronic Mail Security |
| 19. | IP Security |