Basic Cryptography (2020)
The intent of the Basic Cryptography Knowledge Unit is to provide students with a basic ability to understand where and how cryptography is used.
To complete this KU, students should be able to do the following:
- Students will be able to identify the elements of a cryptographic system.
- Students will be able to describe the differences between symmetric and asymmetric algorithms.
- Students will be able to describe which cryptographic protocols, tools and techniques are appropriate for a given situation.
- Students will be able to describe how crypto can be used, strengths and weaknesses, modes, and issues that have to be addressed in an implementation (e.g., key management), etc.
- Common cryptographic uses
- Security Functions (data protection, data integrity, authentication, non-repudiation)
- Block vs. stream data
- Digital Signatures (Authentication)
- Hash Functions (MD4, MD5, SHA-1, SHA-2, SHA-3)
- Integrity checking
- For protecting authentication data
- Collision resistance
- Symmetric Cryptography (DES, Twofish)
- Public Key Cryptography(Diffie-Hellman, RSA, ECC, ElGamal, DSA)
- Public Key Infrastructure
- Key Management (creation, exchange/distribution)
- Cryptography in practice
- Common Cryptographic Protocols
- DES -> AES (evolution from DES to AES)
- Cryptographic Modes (and their strengths and weaknesses)
- Cryptographic standards (FIPS 140 series)
- Cryptographic failures
- Types of Attacks (brute force, chosen plaintext, known plaintext, differential and linear cryptanalysis, etc.)
- Implementation failures
- Create a public/private key pair.
- Create a one-way hash and compare to a known hash value.
- Sign documents using a digital signature.
- Open an ssh session using a public/private key pair.
- Encrypt and decrypt a communication, file, or object using a symmetric key.
NICE Framework Categories
Related Knowledge Units
Suggested academic readings
Sample knowledge test
Sample skills test
Sample abilities test
Additional notes or materials