1 |
- |
Fundamentals of network and computer security, introduction |
Expression |
2 |
Research |
Information security concepts, terminology and principles |
Expression |
3 |
Research |
Symmetric encryption method |
Expression |
4 |
Research |
Classical encryption techniques |
Expression |
5 |
Research |
Block cipher and DES |
Expression |
6 |
Research |
Introduction to Finite Fields |
Expression |
7 |
Research |
AES |
Expression |
8 |
- |
MID-TERM EXAM |
- |
9 |
Research |
More details about symmetric encryption |
Expression |
10 |
Research |
Introduction to Number Theory (prime numbers, Fermat's and Euler's Theorems) |
Expression |
11 |
Research |
Prime number testing method, Chinese Remainder Theorem, Concept of discrete logarithm |
Expression |
12 |
Research |
Introduction to Public Key Encryption Method (PKE) |
Expression |
13 |
Research |
Key distribution and the Diffie-Hellman algorithm |
Expression |
14 |
Research |
RSA Encryption technique |
Expression |
15 |
Research |
Identity and data integrity verification applications of PKE, hash functions |
Expression |
16 |
- |
FINAL EXAM |
- |
17 |
- |
FINAL EXAM |
- |