Introduction to the course and the Cryptographic Toolkit-1.0 Introduction to the course
Introduction to the course
()
Course syllabus
Starting your studies
How to setup a study journal
()
Everyday cryptography: fundamental principles and applications by Keith Martyn
Introduction to the course and the Cryptographic Toolkit-1.1 Why Cryptography?
Introduction to cryptography
()
First thoughts on cryptography
Risks to information
Physical world security services
()
Introduction to the course and the Cryptographic Toolkit-1.2 Security Services and Cryptographic Primitives
Security services
Core services
()
Relationship between services
Cryptographic terminology
Activity: Identifying algorithms
Week 1 summary
()
Reflection
Applications of Cryptography-2.1 Identifying Applications of Cryptography
Introduction to applications of cryptography
()
Introduction to the Big Six
()
Applications of Cryptography-2.2 Matching Services to Applications
Wi-Fi services
()
Case study: Supporting mobile call protection
Week 2 summary
()
Reflection
Cryptosystems-3.1 Basic Model of a Cryptosystem
Introduction to cryptosystems
()
Model of a cryptosystem
Algorithms and keys
()
Cryptosystems-3.2 Two Types of Cryptosystem
Two types of cryptosystem
How different types of cryptosystem are used
()
Week 3 summary
()
Reflection
Attacking Cryptosystems-4.1 Attack Assumptions
Introduction to attacking cryptosystems
()
Security assumptions
Attacking Cryptosystems-4.2 Breaking Cryptosystems
Exhaustive key search
Activity: Large numbers
Key lengths
Points of weakness
()
Classes of attack
Two worlds
()
Latest thoughts on cryptography
Week 4 summary
()
Reflection
Attacking Cryptosystems-Course summary
Course summary
()