CS 463
Course Description
After completing this 3-credit course, students should have strong mathematical foundations including information theory, number theory, factoring, and prime number generation; cryptographic protocols including basic building blocks and protocols; cryptographic techniques including key generation and key management, and applications; cryptographic algorithms including DES, AES, Stream Ciphers, Hash functions, digital signatures, and more.
​
​
Important Take-Aways
​
CS 463 has helped with an understanding of the math behind the different forms of encryption and decryption schemes. Additionally, going into depth about the algorithms involved with encryption and decryption, and the history behind them. Finally, after taking CS 463, one of the most important things to walk away with is the understanding behind the security of our information systems and how it will increase as technology develops.
​
Upon successful completion of this course, students will:
-
Recognize the general purpose and goals of the online course
-
Explain functionality of current cryptographic techniques
-
Identify basic mathematical techniques underlying cryptology
-
Evaluate the computational and memory needs of cryptographic techniques
-
Measure the security strengths and risks of cryptographic techniques
-
Discern implications of hardware and software implementations of cryptographic techniques
-
Analyze and critique new cryptographic protocols
-
Analyze applications in terms of security needs
-
Match the security needs of application with appropriate cryptographic techniques
​