0% found this document useful (0 votes)
204 views4 pages

Introduction To Applied Cryptography Syllabus

The course 'Introduction to Applied Cryptography' focuses on the role of cryptography in digital security, emphasizing its importance for everyday applications without delving into complex mathematics. Students will learn about cryptographic tools, their applications, and vulnerabilities, culminating in a practical understanding of cryptosystems and attack techniques. The course includes lectures, quizzes, peer reviews, and discussions, with assessments contributing to the final grade.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
204 views4 pages

Introduction To Applied Cryptography Syllabus

The course 'Introduction to Applied Cryptography' focuses on the role of cryptography in digital security, emphasizing its importance for everyday applications without delving into complex mathematics. Students will learn about cryptographic tools, their applications, and vulnerabilities, culminating in a practical understanding of cryptosystems and attack techniques. The course includes lectures, quizzes, peer reviews, and discussions, with assessments contributing to the final grade.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Introduction to Applied Cryptography

Course description
Cryptography provides the core toolkit that underpins most digital security technologies.
An understanding of what cryptography does, and its limitations, is critical to developing
a wider appreciation of the security of everyday digital applications. Since cryptography
provides tools for atomic security services such as confidentiality and data integrity, an
appreciation of cryptography also equips you with a fundamental understanding of what
security means in cyberspace. Note that this introductory course adopts a non-
mathematical approach to cryptography and avoids unnecessary technical details.

Course goals and outcomes


In this course you will explore the role of cryptography in supporting digital security for
everyday applications such as the internet, mobile phones, wireless networks and
cryptocurrency. You will develop an understanding of the functionality and purpose of
the main cryptographic tools we use today. You will learn how to make decisions about
which cryptographic tools are most appropriate to deploy in specific settings.

Upon successful completion of this module, you will be able to:

1. Explain the precise role that cryptography plays in the security of any digital
system.
2. Appreciate the breadth of use of cryptography to support security of digital
systems.
3. Identify core concepts and terminology concerning use of cryptography.
4. Assess the points of vulnerability relating to cryptography in any digital system
deploying it.

Textbook and Readings


The learning content is drawn from Chapter 1 of the key text
Keith M. Martin, Everyday Cryptography 2nd Ed., Oxford University Press, 2017

Other pieces of reading are available on the web:


• Post-Quantum Cryptography PQC

1
• C. Ellison and B. Schneier (2000). Ten Risks of PKI: What You're Not Being Told
About Public Key Infrastructure. Computer Security Journal, v 16, n 1, 2000
• Dale Walker (9th June 2020). EU inches closer to ban on end-to-end encryption.

Course outline
The course consists of four weeks that focus on key areas of cyber security.

Key concepts:

Week 1. The Cryptographic Toolkit The need for cryptography and the core security
service.

Learning outcomes:

• Justify the need for cryptography.


• Define several fundamental security services that
cryptography provides and explain how these-
interrelate.
• Identify cryptographic primitives associated with
each security service.

Key concepts:

Uses of cryptography to support a wide range of


Week 2. Applications of Cryptography digital systems.

Learning outcomes:

• Identify a wide range of applications of


cryptography.
• Compare the different security service
requirements of several applications of
cryptography.

Key concepts:

Week 3. Cryptosystems The main components of a cryptosystem and


introduce some core terminology.

Learning outcomes:

2
• Describe a basic model for a cryptosystem.
• Explain the crucial roles in a cryptosystem played
by algorithms and keys.
• Compare symmetric and public-key
cryptosystems, inferring implications about their
different uses.
• Compare the cryptography used in several
everyday applications

Key concepts:

Week 4. Attacking Cryptosystems Various ways in which an attacker could try to


overcome the protection offered by
cryptography.

Learning outcomes:

• Justify standard assumptions about what an


attacker knows about a cryptosystem.
• Categorize different layers of a cryptosystem that
an attacker could exploit.
• Identify some attack techniques against a
cryptosystem

Activities of this course


The course is comprised of the following elements

• Lecture videos.
o Lectures broadly divided into four weeks that evolve from theoretical foundation
to practical application of cryptography.
• Investigating activities.
o Conducting web search and recording findings to a study journal.
• Practice Quizzes.
o Reflective questions with feedback provided after submission of answers.
• Peer Reviewed Assignment.
o One peer reviewed assignment that need to pass by providing constructive
feedback to peers and discuss what you can learn from their work.
• Discussion Prompt.

3
o There are many activities included in discussion prompts in every week which
you will need to complete and share outputs on discussion forum. It is strongly
recommended that learners engage in these debates with their fellow peers.
• Graded quizzes.
o There is a graded quiz in the end of each week.

How to pass this course


The course has five graded assessments each worth 20% of your grade:

Activity Deadline Estimated time % of final


week per module grade

Peer review 4 1 hour 20%

Graded quiz 1 30 min 20%


‘Week 1 test’

Graded quiz 2 30 min 20%


‘Week 2 test’

Graded quiz 3 30 min 20%


‘Week 3 test’

Graded quiz 4 30 min 20%


‘Week 4 test’

You might also like