70-525 Encryption and Authentication

This course will present key cryptologic terms, concepts, and principles. Traditional cryptographic and cryptanalytic techniques are covered plus perspective on successes and failures in cryptologic history, including both single-key algorithms and double-key algorithms. Issues in network communications, network security, and security throughout the different layers of the OSI model for data communications will also be discussed in depth, as well as the use of cryptologic protocols to provide a variety of security services in a networked environment. Authentication, access control, non­ repudiation, data integrity, and confidentiality issues will also be covered, plus key generation, control, distribution, and certification issues.

Credits

3

Cross Listed Courses

68-525.

Prerequisite

70-510.