The following paragraphs were taken from the Blackboard course information.
Course Description
After completing this 3 credit course, students should have strong mathematical foundations including information theory, number theory, factoring, and prime number generation; Cryptographic protocols including basic building blocks and protocols; Cryptographic techniques including key generation and key management, and applications; Cryptographic algorithms including DES, AES, Stream Ciphers, Hash functions, digital signatures, and more.
Readings
REQUIRED TEXT BOOK
Understanding Cryptography: A Textbook for Students and Practitioners, Authors: Christof Paar and Jan Pelzl
Paar, C. Pelzl, J. (2010). Understanding Cryptography: A Textbook for Students and Practitioners. Springer Heidelberg Dordrecht London New York, 1st edition.
ISBN: 978-3-642-04100-6
Other readings are listed in each module.
General Course Objectives:
Upon successful completion of this course, students will:
- Recognize the general purpose and goals of the online course
- Explain functionality of current cryptographic techniques
- Identify basic mathematical techniques underlying cryptology
- Evaluate the computational and memory needs of cryptographic techniques
- Measure the security strengths and risks of cryptographic techniques
- Discern implications of hardware and software implementations of cryptographic techniques
- Analyze and critique new cryptographic protocols
- Analyze applications in terms of security needs
- Match the security needs of application with appropriate cryptographic techniques
More specific objectives for each topic are listed within each module.
How the Course Works
Methods of Delivery/Learning Activities
This online course employs several methods of delivery and learning activities including online lectures and presentations, threaded discussions, Web sites, video clips, reading and written assignments, self-assessment checks, examinations, e-mail, and electronic access of information.