2013-2014 Official General Catalog [Archived Catalog]
|
CST 262 - Cryptographic Systems This course provides a detailed exposure to the many different cryptographic techniques and systems employed in secure transmission and storage of data. Symmetric versus asymmetric encryption and decryption, the importance of key length and algorithm complexity, and applications for encryption and hashing are presented. The characteristics of secure web transactions, including VPN tunnels, secure email, secure FTP, and secure telnet, as well as the various security protocols, are also covered.
Prerequisite- Corequisite Prerequisite: MAT 130 Algebra and Trigonometry
Credits: 3 Hours 2 Class Hours, 2 Laboratory Hours Course Profile Course Objectives:
1. Understand the mathematics involved in symmetric and asymmetric cryptographic algorithms.
2. Explain the features, operation, and differences between the different symmetric cryptographic algorithms DES, 3DES, and AES.
3. Explain the features, operation, and differences between the different asymmetric cryptographic algorithms RSA, ElGamal, and Elliptic curve.
4. Explain the purpose and methods of message integrity and authentication.
5. Describe the difference between cryptography and hashing and how MD5 and SHA operate.
6. Explain how secure email is exchanged via PGP and S/MIME and what role digital signatures take in the process.
7. Describe how security is handled at the transport layer via SSL and TLS and at the network layer via IPSec.
Learning Outcomes of the Course:
Upons successful completion of this course the student will be able to:
1. Use the necessary mathematical operations required of symmetric and asymmetric algorithms.
2. Describe the operation of DES, 3DES, and AES cryptosystems.
3. Explain the operation of RSA, ElGamal, and Elliptic curve cryptosystems.
4. Understand how message integrity and authentication are performed.
5. Be familiar with MD5 and SHA hashing and where it is used.
6. Send and receive secure email using PGP and S/MIME.
7. Demonstrate the use of transport layer and network layer security.
|