This course covers the following fundamental areas:
Threats, defences, and concepts of security.
Foundation mathematics such as Number Theory, Finite Fields, etc.
Cryptographic algorithms such as AES, RSA, SHA, MD5, etc.
Cryptographic protocols such as Needham-Schroeder protocol, Diffie-Hellman key exchange, SRP, etc.
Programme: CE
This course covers the following fundamental areas: Threats, defences, and concepts of security. Foundation mathematics such as Number Theory, Finite Fields, etc. Cryptographic algorithms such as AES, RSA, SHA, MD5, etc. Cryptographic protocols such as Needham-Schroeder protocol, Diffie-Hellman key exchange, SRP, etc.