ITM4610 - Introduction to Cryptography

(ANC-ITM4610.AB1)
Lessons
Lab
TestPrep
Get A Free Trial

Skills You’ll Get

1

Network Security Concepts, Encryption Techniques, Block Ciphers and the Data Encryption Standard

  • Cybersecurity, Information Security, and Network Security
  • The OSI Security Architecture
  • Security Attacks
  • Security Services
  • Security Mechanisms
  •  Cryptography
  • Network Security
  • Trust and Trustworthiness
  • Standards
  • Symmetric Cipher Model
  • Substitution Techniques
  • Transposition Techniques
  • Traditional Block Cipher Structure
  • The Data Encryption Standard
  • A DES Example
  • The Strength of DES
  • Block Cipher Design Principles
2

Advanced Encryption Standard, Random Bit Generation and Stream Ciphers

  • Finite Field Arithmetic
  • AES Structure
  • AES Transformation Functions
  • AES Key Expansion
  • An AES Example
  • AES Implementation
  • Appendix 6A: Polynomials with Coefficients in GF(28)
  • Principles of Pseudorandom Number Generation
  • Pseudorandom Number Generators
  • Pseudorandom Number Generation Using a Block Cipher
  • Stream Ciphers
  • RC4
  • Stream Ciphers Using Feedback Shift Registers
  • True Random Number Generators
3

Public-Key Cryptography, RSA and Cryptographic Hash Functions

  • Principles of Public-Key Cryptosystems
  • The RSA Algorithm
  • Diffie–Hellman Key Exchange
  • Elgamal Cryptographic System
  • Elliptic Curve Arithmetic
  • Elliptic Curve Cryptography
  • Applications of Cryptographic Hash Functions
  • Two Simple Hash Functions
  • Requirements and Security
  • Secure Hash Algorithm (SHA)
  • SHA-3
4

Message Authentication Codes, Digital Signatures, Cryptographic Key Management and Distribution

  • Message Authentication Requirements
  • Message Authentication Functions
  • Requirements for Message Authentication Codes
  • Security of MACs
  • MACs Based on Hash Functions: HMAC
  • MACs Based on Block Ciphers: DAA and CMAC
  • Authenticated Encryption: CCM and GCM
  • Key Wrapping
  • Pseudorandom Number Generation Using Hash Functions and MACs
  • Digital Signatures
  • Elgamal Digital Signature Scheme
  • Schnorr Digital Signature Scheme
  • Nist Digital Signature Algorithm
  • Elliptic Curve Digital Signature Algorithm
  • RSA-PSS Digital Signature Algorithm
  • Symmetric Key Distribution Using Symmetric Encryption
  • Symmetric Key Distribution Using Asymmetric Encryption
  • Distribution of Public Keys
  • X.509 Certificates
  • Public-Key Infrastructure
5

User Authentication, Transport-Level Security and Wireless Network Security

  • Remote User-Authentication Principles
  • Remote User-Authentication Using Symmetric Encryption
  • Kerberos
  • Remote User-Authentication Using Asymmetric Encryption
  • Federated Identity Management
  • Web Security Considerations
  • Transport Layer Security
  • HTTPS
  • Secure Shell (SSH)
  • Wireless Security
  • Mobile Device Security
  • IEEE 802.11 Wireless LAN Overview
  • IEEE 802.11i Wireless LAN Security
A

Appendix A: Basic Concepts from Linear Algebra

  • A.1 Operations on Vectors and Matrices
  • A.2 Linear Algebra Operations Over Zn
B

Appendix B: Measures of Secrecy and Security

  • B.1 Conditional Probability
  • B.2 Perfect Secrecy
  • B.3 Information and Entropy
  • B.4 Entropy and Secrecy
  • B.5 Min-Entropy
C

Appendix C: Data Encryption Standard

D

Appendix D: Simplified AES

  • D.1 Overview
  • D.2 S-AES Encryption and Decryption
  • D.3 Key Expansion
  • D.4 The S-box
  • D.5 S-AES Structure
E

Appendix E: Mathematical Basis of the Birthday Attack

  • E.1 Related Problem
  • E.2 The Birthday Paradox
  • E.3 Useful Inequality
  • E.4 The General Case of Duplications
  • E.5 Overlap Between Two Sets

1

Network Security Concepts, Encryption Techniques, Block Ciphers and the Data Encryption Standard

  • Using OWASP ZAP
  • Performing Symmetric Encryption
2

Advanced Encryption Standard, Random Bit Generation and Stream Ciphers

  • Encrypting a File or Folder
  • Implementing AES Encryption
3

Public-Key Cryptography, RSA and Cryptographic Hash Functions

  • Using OpenSSL to Create a Public/Private Key Pair
  • Using the RSA Asymmetric Algorithm
4

Message Authentication Codes, Digital Signatures, Cryptographic Key Management and Distribution

  • Using Steganography

Related Courses

All Courses
scroll to top