CS5288 - Cryptography: Theory and Practice
|* The offering term is subject to change without prior notice|
The course provides an in-depth study of cryptographic techniques and their role in practical computer systems and applications. It covers the algorithms for symmetric and asymmetric encryption, hash functions, and pseudo random number generation; and the protocols to achieve practical security objectives such as confidentiality, authentication, data integrity, non-repudiation. Associated protocols such as key distribution and public key infrastructure systems will also be dealt with.
Assessment (Indicative only, please check the detailed course information)
Continuous Assessment: 30%
Examination Duration: 2 hours
Detailed Course Information
|Department of Computer Science|