The page uses Browser Access Keys to help with keyboard navigation. Click to learn moreSkip to Navigation

Different browsers use different keystrokes to activate accesskey shortcuts. Please reference the following list to use access keys on your system.

Alt and the accesskey, for Internet Explorer on Windows
Shift and Alt and the accesskey, for Firefox on Windows
Shift and Esc and the accesskey, for Windows or Mac
Ctrl and the accesskey, for the following browsers on a Mac: Internet Explorer 5.2, Safari 1.2, Firefox, Mozilla, Netscape 6+.

We use the following access keys on our gateway

n Skip to Navigation
k Accesskeys description
h Help
    SUNY Broome Community College
  Jan 22, 2018
Website Catalog
[Add to Portfolio]

CST 262 - Cryptographic Systems

This course provides a detailed exposure to the many different cryptographic techniques and systems employed in secure transmission and storage of data.  Symmetric versus asymmetric encryption and decryption, the importance of key length and algorithm complexity, and applications for encryption and hashing are presented.  The characteristics of secure web transactions, including VPN tunnels, secure email, secure FTP, and secure telnet, as well as the various security protocols, are also covered.

Prerequisite- Corequisite
Prerequisite:  MAT 130 Algebra and Trigonometry

Credits: 3
2 Class Hours, 2 Laboratory Hours
Course Profile
Course Objectives:

1.  Understand the mathematics involved in symmetric and asymmetric cryptographic algorithms.
2.  Explain the features, operation, and differences between the different symmetric cryptographic algorithms DES, 3DES, and AES.
3.  Explain the features, operation, and differences between the different asymmetric cryptographic algorithms RSA, ElGamal, and Elliptic curve.
4.  Explain the purpose and methods of message integrity and authentication.
5.  Describe the difference between cryptography and hashing and how MD5 and SHA operate.
6.  Explain how secure email is exchanged via PGP and S/MIME and what role digital signatures take in the process.
7.  Describe how security is handled at the transport layer via SSL and TLS and at the network layer via IPSec.


Learning Outcomes of the Course:

Upons successful completion of this course the student will be able to:

1.  Use the necessary mathematical operations required of symmetric and asymmetric algorithms.
2.  Describe the operation of DES, 3DES, and AES cryptosystems.
3.  Explain the operation of RSA, ElGamal, and Elliptic curve cryptosystems.
4.  Understand how message integrity and authentication are performed.
5.  Be familiar with MD5 and SHA hashing and where it is used.
6.  Send and receive secure email using PGP and S/MIME.
7.  Demonstrate the use of transport layer and network layer security.

[Add to Portfolio]