This course will focus on improving the security of the system using cryptography techniques. Cryptography is the core technology that lies behind the majority of technical security solutions that are currently available.
Principles of Public-Key Cryptosystems, The RSA Algorithm
Diffie-Hellman Key Exchange, ElGamal Cryptosystem
Other IS Management Considerations-Implementing IS Management
Elliptic Curve Arithmetic, Elliptic Curve Cryptography, Pseudorandom Number Generation Based on an Asymmetric Cipher
Applications of Cryptographic Hash Functions, Two Simple Hash Functions, Requirements and Security
Symmetric Key Distribution Using Symmetric Encryption and Asymmetric Encryption, Distribution of Public Keys, X.509 Certificates, Public Key Infrastructure