Applied Cryptography
Objectives
- Understand how the properties of confidentiality, integrity, availability, authenticity, and non-repudiation affect the design and development of protocols for secure communications;
- Understand the main threats and attacks on data in transit over networks of different technologies and in different scenarios;
- Understand the role of cryptography in securing data in transit;
- Use adequate cryptographic protocols for different network scenarios and security requirements;
- Understand the levels of data protection provided by the main secure protocols in computer networks;
- Understand the role of computer networks in protecting personal data privacy.
Program
- Concepts and Fundamentals of Data Security: Security Properties; Threats; Attacks; Vulnerabilities; Risk;
- Symmetric Cryptography: Classic Ciphers; Block Ciphers; Sequential Ciphers;
- Asymmetric Cryptography: Public Key Cryptography; Key Agreement; Digital Signature; Public Key Certificates;
- Cryptographic Algorithms for Data Integrity: One-Way Functions; Message Authentication;
- Protocols for Secure Communication at the Application, Transport, Network and Link Layers;
- Privacy of Personal Data in Transit.
Bibliography
- Stallings, W. Cryptography and Network Security: Principles and Practice (8th Edition), Pearson 2022;
- Du, W. Internet Security: A Hands-on Approach (3rd Edition), 2022;
- Stallings, W. and Brown, L. Computer Security: Principles and Practice (4th Edition), Pearson 2018;
- Whitman, M. and Mattord, H. Principles of Information Security (7th Edition), Cengage 2021;
- Wong, D. Real-World Cryptography, Manning 2021.