1.7 Introduction to Cryptography
Section outline
-
The intent of this Knowledge Unit is to provide students with a basic ability to understand where and how cryptography is used.
-
1.7.1 Topics(s)
-
Symmetric Cryptography (DES, Twofish)
-
Public Key Cryptography
-
Public Key Infrastructure
-
Certificates
-
Hash Functions (MD4, MD5, SHA-1, SHA-2, SHA-3)
-
For integrity
-
For Protecting Authentication Data
-
Collision Resistance
-
Digital Signatures (Authentication)
-
Key Management (Creation, Exchange/Distribution)
-
Cryptographic Modes (Strengths and Weaknesses)
-
Types of Attacks (Brute Force, Chosen Plaintext, Known Plaintext, Differential and Linear Cryptanalysis, etc.)
-
Common Cryptographic Protocols
-
DES -> AES (Evolution from DES to AES)
-
Security Functions (Data Protection, Data Integrity, Authentication)
-
1.7.2 Outcome(s): Students will be able to:
____ Identify the elements of a cryptographic system
____ Describe the differences between symmetric and asymmetric algorithms
____ Describe which cryptographic protocols, tools and techniques are appropriate for a given situation
____ Describe how crypto can be used, strengths and weaknesses, modes, and the issues that must be addressed in an implementation (e.g., key management), etc
-