 |
|
|
|
This course provides you with a survey of modern cryptography. The course
details how programmers and communications professionals can use cryptography -
the technique of enciphering and deciphering messages - to maintain the privacy
of computer data. It describes cryptography algorithms, gives practical advice
on how to implement them in cryptographic software, and shows how they can be
used to solve security problems.
|
|
|
 |
|
|
- Introduction
- Introduction
- Principals
- Classic cryptography
- Challenges
- Protocols and Algorithms Overview
- Cryptographic algorithms
- Protocols
- Hash functions
- Symmetric cryptography
- Asymmetric cryptography
- Symmetric Algorithms
- Asymmetric Algorithms
|
|
- Protocols and Algorithms
- Block ciphers modes
- Key Exchange
- MD5
- SHA1
- DES / 3DES
- RSA
- Introduction to Public Key Infrastructure (PKI)
- Trusted third party
- Complementary Elements
- Key management
- Random generators
- Authentication protocols
- System security
- Conclusion
- Glossary
|
|
|
|
|
 |
 |
 |
- R&D managers and software engineers
- IT security staff, security administrators
- Any technical staff interested in understanding security fundamentals
|
 |
 |
 |
|
|
 |
 |
 |
|
|
|
|
|
|
|
|