• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Syllabus
  • Schedule
    • Section 1
      • Week 1: Course Introduction
      • Week 2: Access Controls
      • Week 3: Systems Software Security
      • Week 4: Applications Software Security
      • Week 5: Cryptography Protocols
      • Week 6: Practical Cryptography
      • Week 7: Midterm Exam
    • Section 2
      • Week 8: Business Continuity & Disaster Recovery
      • Week 9: Security Operations
      • Week 10: Physical & Environmental Security
      • Week 11: Security Architecture & Design
      • Week 12: – Network Protocols
      • Week 13: Telecommunications and Network Security
      • Week 14: Risk Management and Compliance
      • Week 15: Final Exam
  • Course Material
    • Case Studies
      • C2.1 (9/11)
      • C4.1 (9/25)
      • C6.1 (10/9)
      • C8.1 (10/23)
      • C9.1 (10/30)
      • C10.1 (11/6)
      • C11.1 (11/13)
    • Practical Assignments
      • PA1.1 (Due 9/11)
      • PA2.1 (Due 9/18)
      • PA4.1 (Due 10/2)
      • PA5 (Due 10/9)
        • PA5.1
        • PA5.2
        • PA5.3
      • PA8.1 (Due 10/30)
      • PA9.1 (Due 11/6)
      • PA10.1 (Due 11/13)
      • PA11.1 ( Due 11/20)
      • PA12.1 (Due 11/27)
      • PA13 (Due 12/4)
        • PA13.1
        • PA13.2
        • PA13.3
    • Written Assignments
      • WA2.1 (Due 9/18)
      • WA3.1 (Due 9/25)
      • WA4.1 (Due 10/2)
      • WA6.1 (Due 10/16)
      • WA8.1 (Due 10/30)
      • WA9.1 (Due 11/6)
      • WA10.1 (Due 11/13)
      • WA12.1 (Due 11/27)
      • WA13.1 (Due 12/4)
  • Webex
  • Gradebook

ITACS 5209 F17

Temple University

10/9 – Practical Cryptography

Overview

In this section, we continue our discussion of encryption.  We will see how these protocols are used and implemented in standards such as TLS, SSL, IPSec, etc.  We will also look at Public Key Infrastructure, and why this is important for modern encryption.  We will also look at digital signatures and certificates.

In addition, we will take a look at modern cryptanalysis: how attackers find weaknesses in encryption, and how we can evaluate encryption standards, and asses their risk when weaknesses are discovered.

The (ISC)2 Common Body of Knowledge (CBK) defines the key areas of knowledge for cryptography in this way:

The Cryptography domain addresses the principles, means, and methods of applying mathematical algorithms and data transformation to information to ensure its integrity, confidentiality and authenticity.

The candidate will be expected to know basic concepts within cryptography; public and private key algorithms in terms of their applications and uses; algorithm construction, key distribution and management, and methods of attack; the applications, construction and use of digital signatures to provide authenticity of electronic transactions, and non-repudiation of the parties involved; and the organization and management of the Public Key Infrastructure (PKIs) and digital certificates distribution and management.

Key areas of knowledge:

 

  • Understand the application and use of cryptography
  • Understand the cryptographic life cycle (e.g., cryptographic limitations, algorithm/ protocol governance)
  • Understand encryption concepts
  • Understand key management processes Understand digital signatures
  • Understand non-repudiation
  • Understand methods of cryptanalytic attacks Use cryptography in network security Use cryptography to maintain application security
  • Understand Public Key Infrastructure (PKI) Understand certificate related issues
  • Understand information hiding alternatives (e.g., steganography, watermarking)

 

This week’s topics:

  • Applications and Uses of Cryptography
  • Encryption Methodologies
  • Cryptanalysis
  • Key Management
  • Attacks and Countermeasures

 

In this unit, plan to:

  • Read: pages 190-202 in the Network Security text
  • Complete: this week’s written assignment
  • Finish: last week’s practical assignment
  • Participate: in the weekly discussion forum
  • Prepare: for the Case Study Review

 

Written Assignment

Practical Assignment

Case Study Review

 

 

Primary Sidebar

Weekly Discussions

  • Uncategorized (12)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in