Applied Secure Protocols
CIT 43100/ 3 Cr.
This course will emphasize the applied facets of cryptography for the information assurance and security professional. By the end of the course students will be able to apply important cryptographic principles and tools to allow networks to communicate securely.
- Available Online: Yes
- Credit by Exam: No
- Laptop Required: Yes
Course Outcomes (What are these?)
- Apply the following: symmetric-key cryptography, public-key cryptography, one-way functions, & hash functions (CIT e, j, m)
- Demonstrate an understanding of classical cryptography (CIT e, j)
- Demonstrate an understanding or digital signatures (CIT e, j)
- Demonstrate a working knowledge of how to exchange a secret key (CIT e, j)
- Identify and use different encryption algorithms for identification and authentication (CIT j)
- Understand and apply public key infrastructure (PKI) (CIT m)
- Determine when and how various protocols should be used (CIT m)
- Compare and contrast block cipher with stream cipher, AES with DES (CIT j)
- Understand how RSA encryption/decryption work (CIT m)
- Explain birthday attack (CIT e, j)
- Explain dictionary attack (CIT e, j)
CIT Student Outcomes (What are these?)
(e) An understanding of professional, ethical, legal, security and social issues and responsibilities.
(j) An ability to use and apply current technical concepts and practices in the core information technologies.
(m) An understanding of best practices and standards and their application.
- Classical cryptography: substitution ciphers, polyalphabetic methods, etc.
- Cryptography Concepts
- Public-key Cryptography
- Symmetric Key Cryptography
Principles of Undergraduate Learning (PULs)
3. Integration and Application of Knowledge
4. Intellectual Depth, Breadth, and Adaptiveness
5. Understanding Society and Culture
6. Values and Ethics