This course will present key cryptologic terms, concepts and principles. Traditional cryptographic and cryptanalytic techniques are covered plus perspective on successes and failures in cryptologic history, including both single-key algorithms and double-key algorithms. Issues in network communications, network security and security throughout the different layers of the OSI model for data communications will also be discussed in detail, as well as the use of cryptologic protocols to provide a variety of security services in a networked environment. Authentication, access control, non-repudiation, data integrity and confidentiality issues will also be covered, plus key generation, control, distribution and certification issues.
- How and where encryption and authentication are used.
- How to encrypt data using classical techniques.
- What the Law says about encryption, authentication, and digital signatures.
- How symmetric block ciphers like DES, 3-DES, and AES work.
- How symmetric stream ciphers like RC4 and WEP-based encryption work.
- An overview of finite field theory.
- Where to deploy encryption modules and methods.
- How to distribute keys.
- Some theory about prime numbers.
- How public-key encryption and authentication techniques like RSA work.
- How public-key key distribution takes place, including Diffie-Hellman key exchange.
- How to authenticate messages using hash functions and digital signatures.
- What are Kerberos and X.509.
- How to encrypt and authenticate electronic mail.
- How IPSec works.
- How web-server-to-web-client communications are secured.
YOUR OPPORTUNITY: You will learn how data is encrypted for confidentiality, authentication and integrity. You will also learn how technologies such as digital signatures, password systems and VoIP encryptions work, including how the underlying mathematics protects privacy while enhancing performance.
Take the Next Step
Learn more about Lewis University's online programs. Call (866) 967-7046 to speak with a Graduate Admissions Counselor or click here to request more information.