Skip to main content

Apply now! Spring priority deadline is October 1.

CYBR 635 Applied Cryptography

Cryptography is a cornerstone of modern cybersecurity, protecting data across wireless networks, cloud computing, and next-generation applications. This course provides an in-depth exploration of advanced cryptographic techniques, focusing on their practical implementation in securing real-world systems. Students will analyze cryptographic security mechanisms in SSL/TLS, Virtual Private Networks (VPNs), military applications, cryptanalysis, and cryptographic backdoors. Emphasis is placed on evaluating cryptographic frameworks in vehicular ad hoc networks, smart grids, e-health systems, and mobile social networks. Students will also design and implement encryption-based defense strategies to enhance data confidentiality, integrity, and authentication. Additionally, the course examines the threat posed by quantum computing to modern cryptographic systems and explores post-quantum cryptography solutions. By the end of the course, students will have the expertise to apply, evaluate, and develop cryptographic solutions to address emerging cybersecurity and privacy challenges.

Prerequisites

Special information

First day attendance is mandatory.
Prerequisite: Graduate standing or instructor permission. Admission to Graduate Program in Computer Science or Cybersecurity
2 Graduate credits

Effective May 6, 2020 to present

Learning outcomes

General

  • Apply advanced cryptographic techniques to address emerging security and privacy challenges in wireless networks, cloud computing, and other modern applications.
  • Analyze cryptographic implementations in real-world security protocols and military applications, including SSL/TLS, Virtual Private Networks (VPNs), cryptanalysis, and cryptographic backdoors.
  • Evaluate the role of cryptographic security mechanisms in next-generation wireless networks, including vehicular ad hoc networks, smart grids, e-health systems, and mobile social networks.
  • Design and develop encryption-based defense strategies using modern cryptographic frameworks to enhance data confidentiality, integrity, and authentication.
  • Assess and examine the impact of quantum computing on cryptographic security and explore post-quantum cryptography solutions.

Summer 2025

Section Title Instructor books eservices
50 Applied Cryptography Rabieh, Khaled Books for CYBR-635-50 Summer 2025 Course details for CYBR-635-50 Summer 2025