Section outline

  • The intent of this Knowledge Unit is to provide students with a basic ability to understand where and how cryptography is used.

    • 1.7.1 Topics(s)

    • Symmetric Cryptography (DES, Twofish)

    • Public Key Cryptography

    • Public Key Infrastructure

    • Certificates

    • Hash Functions (MD4, MD5, SHA-1, SHA-2, SHA-3)

    • For integrity

    • For Protecting Authentication Data

    • Collision Resistance

    • Digital Signatures (Authentication)

    • Key Management (Creation, Exchange/Distribution)

    • Cryptographic Modes (Strengths and Weaknesses)

    • Types of Attacks (Brute Force, Chosen Plaintext, Known Plaintext, Differential and Linear Cryptanalysis, etc.)

    • Common Cryptographic Protocols

    • DES -> AES (Evolution from DES to AES)

    • Security Functions (Data Protection, Data Integrity, Authentication)

    • 1.7.2 Outcome(s): Students will be able to:

      ____ Identify the elements of a cryptographic system
      ____ Describe the differences between symmetric and asymmetric algorithms
      ____ Describe which cryptographic protocols, tools and techniques are appropriate for a given situation
      ____ Describe how crypto can be used, strengths and weaknesses, modes, and the issues that must be addressed in an implementation (e.g., key management), etc