CYBR 635 Applied Cryptography
Cryptography is a cornerstone of modern cybersecurity, protecting data across wireless networks, cloud computing, and next-generation applications. This course provides an in-depth exploration of advanced cryptographic techniques, focusing on their practical implementation in securing real-world systems. Students will analyze cryptographic security mechanisms in SSL/TLS, Virtual Private Networks (VPNs), military applications, cryptanalysis, and cryptographic backdoors. Emphasis is placed on evaluating cryptographic frameworks in vehicular ad hoc networks, smart grids, e-health systems, and mobile social networks. Students will also design and implement encryption-based defense strategies to enhance data confidentiality, integrity, and authentication. Additionally, the course examines the threat posed by quantum computing to modern cryptographic systems and explores post-quantum cryptography solutions. By the end of the course, students will have the expertise to apply, evaluate, and develop cryptographic solutions to address emerging cybersecurity and privacy challenges.
First day attendance is mandatory.
Prerequisite: Graduate standing or instructor permission. Admission to Graduate Program in Computer Science or Cybersecurity
Prerequisites
Special information
Prerequisite: Graduate standing or instructor permission. Admission to Graduate Program in Computer Science or Cybersecurity
2 Graduate credits
Effective May 6, 2020 to present
Learning outcomes
General
- Apply advanced cryptographic techniques to address emerging security and privacy challenges in wireless networks, cloud computing, and other modern applications.
- Analyze cryptographic implementations in real-world security protocols and military applications, including SSL/TLS, Virtual Private Networks (VPNs), cryptanalysis, and cryptographic backdoors.
- Evaluate the role of cryptographic security mechanisms in next-generation wireless networks, including vehicular ad hoc networks, smart grids, e-health systems, and mobile social networks.
- Design and develop encryption-based defense strategies using modern cryptographic frameworks to enhance data confidentiality, integrity, and authentication.
- Assess and examine the impact of quantum computing on cryptographic security and explore post-quantum cryptography solutions.
Summer 2025
Section | Title | Instructor | books | eservices |
---|---|---|---|---|
50 | Applied Cryptography | Rabieh, Khaled | Books for CYBR-635-50 Summer 2025 | Course details for CYBR-635-50 Summer 2025 |