Applied Cryptography – CSCI 605
CG • Section 8WK • 11/08/2019 to 04/16/2020 • Modified 07/28/2020
This course covers topics in modern cryptography with an emphasis on learning how to implement cryptographic protocols using mainstream cryptographic libraries such as OpenSSI.
This course offers an introduction to the mathematical foundation and primary building blocks of the field of cryptography. In today’s interconnected world, it is more important than ever to keep our data safe. The student will learn what techniques are used to keep information secure and confidential, as well as its limitations. Mathematical rigor is emphasized; however the primary thrust of the course is to enable the student to develop cryptographically secure code.
Measurable Learning Outcomes
Upon successful completion of this course, the student will be able to:
- Identify the difference between public key and symmetric key cryptography.
- Implement basic cryptographic protocols safely and securely.
- Evaluate a cryptographic protocol.
- Integrate biblical principles within the field of applied cryptography.
Textbook readings and lecture presentations
Course Requirements Checklist
After reading the Course Syllabus and Student Expectations, the student will complete the related checklist found in Module/Week 1.
Discussion Board Forums (4)
Discussion boards are collaborative learning experiences. Therefore, the student is required to provide a thread in response to the provided prompt for each forum. Each thread must be at least 300 words and demonstrate course-related knowledge. In addition to the thread, the student is required to reply to 2 other classmates’ threads. Each reply must be at least 150 words. All assertions in the thread and replies must be supported by Reading & Study materials, good examples, thoughtful analysis, and at least 2 scholarly resources.
Lab Assignments (3)
The student will complete the assigned lab report after completing the assigned labs.
Article Review Research Paper (2)
The student will complete research papers based on scholarly articles related to the topic of cryptography. Each research paper will include a minimum of 750 words, 7 citations, and adhere to APA format.
Each quiz will cover the Reading & Study material for the module/week in which it is assigned. Each quiz will be open-book/open-notes, contain 10 multiple-choice or short answer questions, and have a 1-hour time limit.
The Midterm Exam will cover the Reading & Study material for Modules/Weeks 1–4. The Midterm Exam will be open-book/open-notes, contain 26 true/false, multiple choice, and short answer questions, and have a 2-hour time limit.
The Final Exam will cover all the Reading & Study material for the course. The Final Exam will be open-book/open-notes, contain 26 true/false, multiple choice, and short answer questions, and have a 2-hour and 45-minute time limit.