| |
Mar 29, 2026
|
|
|
|
|
IT 463 - Cryptography Modern cryptographic algorithms and techniques underpin many of the tools, programs, and devices used to provide security in today’s organizations. In this course, students will get an in-depth look at the building blocks of cryptographic algorithms, utilize modern ciphers through practical exercises, discuss current issues around cryptography, and gain a deep understanding of how cryptography is used to ensure the confidentiality, integrity, availability, and non-repudiation of organizational information. Symmetric, asymmetric, and un-keyed algorithms will be explored, as well as practical attacks and defenses applicable to cryptographic keys.
Credit(s): 3
Prerequisite(s): IT 417 .
Outcomes
- Associate the history and building blocks cryptographic algorithms with modern ciphers.Use cryptographic tools.
- Build simple applications that utilize cryptographic algorithms.
- Compare and contrast the relative strengths and weaknesses of modern ciphers and their applications.
- Explore practical attacks and defenses against cryptographic keys.
- Assess the role cryptography plays in ensuring the confidentiality, integrity, availability, and non-repudiation of organizational information.
- Discuss current issues related to the field of cryptography.
Add to Favorites (opens a new window)
|
|