• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Syllabus
  • Schedule
    • Section 1
      • Week 1: Course Introduction
      • Week 2: Access Controls
      • Week 3: Systems Software Security
      • Week 4: Applications Software Security
      • Week 5: Cryptography Protocols
      • Week 6: Practical Cryptography
      • Week 7: Midterm Exam
    • Section 2
      • Week 8: Business Continuity & Disaster Recovery
      • Week 9: Security Operations
      • Week 10: Physical & Environmental Security
      • Week 11: Security Architecture & Design
      • Week 12: – Network Protocols
      • Week 13: Telecommunications and Network Security
      • Week 14: Risk Management and Compliance
      • Week 15: Final Exam
  • Course Material
    • Case Studies
      • C2.1 (9/11)
      • C4.1 (9/25)
      • C6.1 (10/9)
      • C8.1 (10/23)
      • C9.1 (10/30)
      • C10.1 (11/6)
      • C11.1 (11/13)
    • Practical Assignments
      • PA1.1 (Due 9/11)
      • PA2.1 (Due 9/18)
      • PA4.1 (Due 10/2)
      • PA5 (Due 10/9)
        • PA5.1
        • PA5.2
        • PA5.3
      • PA8.1 (Due 10/30)
      • PA9.1 (Due 11/6)
      • PA10.1 (Due 11/13)
      • PA11.1 ( Due 11/20)
      • PA12.1 (Due 11/27)
      • PA13 (Due 12/4)
        • PA13.1
        • PA13.2
        • PA13.3
    • Written Assignments
      • WA2.1 (Due 9/18)
      • WA3.1 (Due 9/25)
      • WA4.1 (Due 10/2)
      • WA6.1 (Due 10/16)
      • WA8.1 (Due 10/30)
      • WA9.1 (Due 11/6)
      • WA10.1 (Due 11/13)
      • WA12.1 (Due 11/27)
      • WA13.1 (Due 12/4)
  • Webex
  • Gradebook

ITACS 5209 F17

Temple University

10/2 – Cryptography Protocols

WebEx Link: https://foxsbm.webex.com/foxsbm/lsr.php?RCID=cccad54c5a3dd3bb85ebff2978b8c869

Overview

One of the most effective means of protecting our data, whether at rest of in transit, is encryption.  In this section of the course, we will learn some of the basic concepts behind cryptography, and modern encryption protocols.  These protocols are one of three types: asynchronous, which are extremely efficient but share a common key (which presents some challenges), asynchronous, which are less efficient, but use a pair of keys (which is far more secure than a shared key), and hashing algorithms, which only encrypt data (they cannot “decrypt”).

Once we learn the encryption protocols, we will explore some practical applications of encryption in the next unit.

This week’s topics:

  • Synchronous protocols:
    • DES
    • 3DES
    • AES
    • RC4
  • Asynchronous protocols:
    • RSA
  • Hashing and Trust:
    • Message Digest
    • SHA

 

In this unit, plan to:

  • Read: pages 572-629 in the Network Security text
  • Read: pages 176-189 in the Security Essentials text
  • Begin: this week’s practical assignment
  • Participate: in the weekly discussion forum

 

 

Practical Assignment Part 1

Practical Assignment Part 2

Practical Assignment Part 3

 

 

Primary Sidebar

Weekly Discussions

  • Uncategorized (12)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in