The basics of cryptographic algorithms and protocols including encryption and authentication algorithms and key establishment protocols. Security evaluation in computational and information theoretic settings, and attacks on cryptographic applications and systems.
This course may not be repeated for credit.
Prerequisite(s)
- Admission to the Graduate Certificate in Network Security, the Graduate Certificate in Data Privacy, or the Master of Information Security and Privacy.
Sections
| LEC 1 | MTWRF 09:00 - 17:00
| | Michael John Jacobson Jr. | | |
| Notes:
Students will participate in a combination of synchronous and asynchronous instruction for the entire duration of the month. Please refer to your Course Outline for further scheduling details. |
This course will be offered next in
Winter 2022.