Search
IUPUI School of Engineering and Technology

IUPUI School of Engineering and Technology

Applied Secure Protocols

CIT 43100 / 3 Cr.

This course will emphasize the applied facets of cryptography for the information assurance and security professional. By the end of the course students will be able to apply important cryptographic principles and tools to allow networks to communicate securely.

Software

Provided

Outcomes

Course Outcomes (What are these?)

  • Apply the following: symmetric-key cryptography, public-key cryptography, one-way functions, & hash functions (CIT e, j, m)
  • Demonstrate an understanding of classical cryptography (CIT e, j)
  • Demonstrate an understanding or digital signatures (CIT e, j)
  • Demonstrate a working knowledge of how to exchange a secret key (CIT e, j)
  • Identify and use different encryption algorithms for identification and authentication (CIT j)
  • Understand and apply public key infrastructure (PKI) (CIT m)
  • Determine when and how various protocols should be used (CIT m)
  • Compare and contrast block cipher with stream cipher, AES with DES  (CIT j)
  • Understand how RSA encryption/decryption work (CIT m)
  • Explain birthday attack (CIT e, j)
  • Explain dictionary attack (CIT e, j)

CIT Student Outcomes (What are these?)

(e) An understanding of professional, ethical, legal, security and social issues and responsibilities.

(j) An ability to use and apply current technical concepts and practices in the core information technologies.

(m) An understanding of best practices and standards and their application.

Topics
  • Classical cryptography: substitution ciphers, polyalphabetic methods, etc.
  • CryptAnalysis
  • Cryptography Concepts
  • Public-key Cryptography
  • Symmetric Key Cryptography
Principles of Undergraduate Learning (PULs)

3. Integration and Application of Knowledge

4. Intellectual Depth, Breadth, and Adaptiveness

5. Understanding Society and Culture

6. Values and Ethics

What You Will Learn

Classical cryptography: Ciphers, Polyalphabetic Methods, etc.

  • Describe two major cryptographic innovations
  • Define the following: Cryptography, Cryptographers, Cryptanalysts, and Cryptology
  • List primary objectives of Cryptography
  • Explain substitution cipher
  • Explain transposition cipher

Cryptanalysis

  • Crack disguise
  • Decode secrets
  • Break protocols
  • Find weaknesses
  • Can be analyzed for patterns
  • Patterns
  • Best guesses

Crytography Concepts

  • Define a good algorithm
  • List the 4 major information assurances that cryptography focuses on
  • Define confidentiality, Authentication, Integrity and nonrepudiation
  • Explain the attack on authentication
  • Define pseudo random
  • Define the ways in which Mallory can affect integrity
  • Define hash
  • Define MAC
  • Define nonrepudiation

Public-key cryptography

  • Create and manage shared folders using Windows Explorer and the Microsoft Management Console
  • Manage shared folder permissions
  • How do we deliver a secure secret key via public means?
  • Define goals of public key
  • Easy vs hard problem
  • Understand modular math
  • Understand attacks on public key
  • Define digital signatures
  • List the assurances of Digital Signatures
  • List the assurances of Public Key
  • Assimilate the authentication and integrity of Public Key and Digital Signatures
  • What are the attacks on Digital Signatures
  • List the Digital Signature Algorithms

Symmetric key cryptography

  • List the issues with Secret Key cryptography
  • Describe Trent's role in Secret Key crypto?
  • Describe a KDC
  • Describe the problems with trusted third parties
  • Understand attacks on secret key