Applied Cryptography

Objectives

  • Understand how the properties of confidentiality, integrity, availability, authenticity, and non-repudiation affect the design and development of protocols for secure communications;
  • Understand the main threats and attacks on data in transit over networks of different technologies and in different scenarios;
  • Understand the role of cryptography in securing data in transit;
  • Use adequate cryptographic protocols for different network scenarios and security requirements;
  • Understand the levels of data protection provided by the main secure protocols in computer networks;
  • Understand the role of computer networks in protecting personal data privacy.

Program

  • Concepts and Fundamentals of Data Security: Security Properties; Threats; Attacks; Vulnerabilities; Risk;
  • Symmetric Cryptography: Classic Ciphers; Block Ciphers; Sequential Ciphers;
  • Asymmetric Cryptography: Public Key Cryptography; Key Agreement; Digital Signature; Public Key Certificates;
  • Cryptographic Algorithms for Data Integrity: One-Way Functions; Message Authentication;
  • Protocols for Secure Communication at the Application, Transport, Network and Link Layers;
  • Privacy of Personal Data in Transit.

Bibliography

  • Stallings, W. Cryptography and Network Security: Principles and Practice (8th Edition), Pearson 2022;
  • Du, W. Internet Security: A Hands-on Approach (3rd Edition), 2022;
  • Stallings, W. and Brown, L. Computer Security: Principles and Practice (4th Edition), Pearson 2018;
  • Whitman, M. and Mattord, H. Principles of Information Security (7th Edition), Cengage 2021;
  • Wong, D. Real-World Cryptography, Manning 2021.

Updated: