
Description:  Security protocol modules; Introduction to the basics and objectives of cryptography namely confidentiality, data integrity, authentication, freshness, and nonrepudiation; Security Tools; Symmetric (secretkey) mechanisms for encryption and data authentication; Asymmetric (publickey) mechanisms for keyexchange; Encryption and data authentication; Algorithms related to cryptographic operations; Key management and key generation; Implementation of algorithms. (Prerequisite: ITBP210 and ITBP202) 
Credit Hours.:  3 
Text Book:  William Stallings, Cryptography and Network Security: Principles and Practice, 3rd Edition, Prentice 
Coordinator:  Yousef Ali Mohammed Mubarak Al Hammadi 
Topics Outline:   Overview of security threats and countermeasures in computer communications
 Classical encryption techniques
 Block cipher
 Data encryption standard (DES)
 Introduction to finite fields
 Advanced encryption technique (AES)
 Triple DES encryption algorithm
 RC5 & RC4 encryption algorithms
 Confidentiality using symmetric encryption
 Introduction to number theory
 11.Public key cryptography and RSA
12.Key management
 13.Message Authentication, Hash Functions, and Hash Algorithms
14.Digital Signatures & Authentication Protocols

Outcomes:   Explain the fundamentals of contemporary cryptography and its application.
 Compare symmetric and asymmetric cryptographic techniques
 Apply digital signature and key exchange scenarios.
 Identify security threats associated with cryptographic algorithms
 Evaluate various cryptographic techniques.

Mapping of Topics Outline to Outcomes   1 
2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
1 
           
2 
           
3 
           
4 
           
5 
           

Prerequisite  ITBP210: Communications and Network Fundamentals ITBP202: Discrete Mathematics
