# Difference between revisions of "Basic Cryptography (2020)"

From CyberEdWiki

(→Outcomes) |
|||

Line 2: | Line 2: | ||

== Outcomes == | == Outcomes == | ||

− | + | After completing the KU, students will be able to: | |

# Construct the elements of a cryptographic system. | # Construct the elements of a cryptographic system. | ||

# Compare symmetric and asymmetric algorithms. | # Compare symmetric and asymmetric algorithms. |

## Latest revision as of 22:10, 21 November 2019

The intent of the **Basic Cryptography** Knowledge Unit is to provide students with a basic ability to understand where and how cryptography is used.

## Contents

## Outcomes[edit]

After completing the KU, students will be able to:

- Construct the elements of a cryptographic system.
- Compare symmetric and asymmetric algorithms.
- Evaluate which cryptographic protocols, tools and techniques are appropriate for a given situation.
- Assess cryptographic weaknesses, failures, and implementation issues.
- Appraise the pros and cons of real world cryptographic applications.

## Topics[edit]

- Common cryptographic uses
- Security Functions (data protection, data integrity, authentication, non-repudiation)
- Block vs. stream data
- Digital Signatures (Authentication)

- Hash Functions (MD4, MD5, SHA-1, SHA-2, SHA-3)
- Integrity checking
- For protecting authentication data
- Collision resistance

- Symmetric Cryptography (DES, Twofish)
- Public Key Cryptography(Diffie-Hellman, RSA, ECC, ElGamal, DSA)
- Public Key Infrastructure
- Certificates
- Key Management (creation, exchange/distribution)

- Cryptography in practice
- Common Cryptographic Protocols
- DES -> AES (evolution from DES to AES)
- Cryptographic Modes (and their strengths and weaknesses)
- Cryptographic standards (FIPS 140 series)

- Cryptographic failures
- Types of Attacks (brute force, chosen plaintext, known plaintext, differential and linear cryptanalysis, etc.)
- Implementation failures

## Skills[edit]

- Create a public/private key pair.
- Create a one-way hash and compare to a known hash value.
- Sign documents using a digital signature.
- Open an ssh session using a public/private key pair.
- Encrypt and decrypt a communication, file, or object using a symmetric key.

## NICE Framework Categories[edit]

## CSEC 2017 Categories[edit]

## Specialization Areas[edit]

## See also[edit]

**Related Knowledge Units**

## Further reading[edit]

### Suggested textbooks[edit]

### Suggested academic readings[edit]

## Sample knowledge test[edit]

## Sample skills test[edit]

## Sample abilities test[edit]

## Additional notes or materials[edit]

## Contacts[edit]

## Reference ID[edit]

BCY