- To understand classical algorithms in network security.
- To identify and apply symmetric key algorithms effectively.
- To explore and implement asymmetric-key algorithms securely.
- To utilise hash functions for data integrity and security.
- To comprehend the role of digital certificates in network security.
- To analyse PKI frameworks and their applications in networks.
- To apply cryptographic applications in real-world network scenarios.
UNIT 1. INTRODUCTION. CLASSICAL ALGORITHMS Introduction Principle of cryptography Classic algorithms (I) Classic algorithms (II) Enigma UNIT 2. SYMMETRIC KEY ALGORITHM Introduction Principles of symmetric encryption Symmetric key algorithms Other symmetric algorithms Unit summary UNIT 3. ASYMMETRIC-KEY ALGORITHMS. HASH FUNCTION Introduction Asymmetric key algorithm Hash function and collisions Digital signature Unit summary UNIT 4. DIGITAL CERTIFICATES, PKI AND CRYPTOGRAPHIC APPLICATIONS Digital certificates Digital signature Tools and applications (I) Tools and applications (II) The future of cryptography