CYB301 - Cryptography Techniques, Algorithms and Applications

Cryptography Techniques, Algorithms and Applications is a comprehensive course that introduces the fundamental principles and practical methods used to secure digital information and communication systems. It covers core concepts such as encryption and decryption, symmetric and asymmetric key cryptography, hashing techniques, digital signatures, and key management, alongside widely used algorithms like Advanced Encryption Standard, Rivest–Shamir–Adleman, and Secure Hash Algorithm. The course also explores real-world applications including secure web communication, blockchain technology, data privacy, and authentication systems, while examining emerging trends and challenges in modern cryptography such as quantum resistance and secure distributed systems.

Department
Computer Science
Faculty/School
School of Computing and Information Technology
Lecturer
Course Team

Objectives

The objective of the course Cryptography Techniques, Algorithms and Applications is to provide students with a solid foundation in the principles and practices of secure communication by exploring core cryptographic concepts, classical and modern encryption techniques, and widely used algorithms. The course aims to equip learners with the ability to understand, analyze, and implement cryptographic methods such as symmetric and asymmetric encryption, hashing, and digital signatures, while also examining their practical applications in areas like data protection, network security, authentication systems, and secure distributed computing. By the end of the course, students should be capable of evaluating the strengths and limitations of different cryptographic schemes and applying appropriate solutions to real-world security challenges.

Learning Outcomes

By the end of this course on Cryptography Techniques, Algorithms and Applications, students will be able to explain fundamental concepts in modern Cryptography, analyze and compare classical and contemporary cryptographic algorithms, and apply appropriate techniques such as encryption, decryption, hashing, and digital signatures to secure data and communication systems. They will also develop the ability to evaluate the strengths and limitations of various cryptographic protocols, implement basic security solutions, and understand real-world applications in areas such as secure networking, electronic transactions, and data protection.

Course Modules and Resources

Week 1: Introduction to Cryptography

Introduction to Cryptography

Module Learning Outcomes:
Definition, goals, and history of cryptography
Security services: confidentiality, integrity, authentication, non-repudiation
Basic terminology and real-world applications

No published resource under this module yet.