| 1 |
- |
Fundamentals of network and computer security, introduction |
Expression |
| 2 |
Research |
Information security concepts, terminology and principles |
Expression |
| 3 |
Research |
Symmetric encryption method |
Expression |
| 4 |
Research |
Classical encryption techniques |
Expression |
| 5 |
Research |
Block cipher and DES |
Expression |
| 6 |
Research |
Introduction to Finite Fields |
Expression |
| 7 |
Research |
AES |
Expression |
| 8 |
Research |
More details about symmetric encryption |
Expression |
| 9 |
Research |
Introduction to Number Theory (prime numbers, Fermat's and Euler's Theorems) |
Expression |
| 10 |
- |
MID-TERM EXAM |
- |
| 11 |
Research |
Prime number testing method, Chinese Remainder Theorem, Concept of discrete logarithm |
Expression |
| 12 |
Research |
Introduction to Public Key Encryption Method (PKE) |
Expression |
| 13 |
Research |
Key distribution and the Diffie-Hellman algorithm |
Expression |
| 14 |
Research |
RSA Encryption technique |
Expression |
| 15 |
Research |
Identity and data integrity verification applications of PKE, hash functions |
Expression |
| 16 |
- |
FINAL EXAM |
- |
| 17 |
- |
FINAL EXAM |
- |