Learning Objectives 
Crypto Algorithms 

 Know what a secret key cryptosystem is
 Know what a public key cryptosystem is
 Know specific secret key algorithms: AES, DES, IDEA
 Know specific public key protocols: DiffieHellman, RSA
 Understand message digests (hashing) and how it is used in encryption
 Understand elliptic curve cryptography

Block Ciphers 

 Explain what Electronic Code Book is
 Explain what Cipher Block Chaining is
 Explain what Output Feedback Block is
 Explain how to check the integrity of a message sent in the clear
 Explain how to check the integrity of an encrypted message

Stream Ciphers 

 Explain what an unconditionally secure cipher is
 Explain how entropy is used in determining the value of cipher
 Know what a onetime pad is
 Explain what a synchronous stream cipher is
 Explain what a selfsynchronizing stream cipher is
 Explain the role of linear feedback shift registers in stream ciphers
 Know some attacks on stream ciphers and some countermeasures
 Know the BerlekampMassey for finding the shortest linear feedback
shift register for a given binary output sequence
 Know RC4 and its weaknesses

Authentication 

 Understand zeroknowledge authentication
 Know how to use RSA signatures for authentication
 Know the Digital Signature Standard
 Know how message digests are used in authentication
 Understand vulnerabilities associated with authentication protocols

Cryptosystem Infrastructure 

 Know what a Certification Authority and its affiliated components are
 Know what a Key Distribution Center and protocols for using one are
 Know what a public key infrastructure is

Systems for Authentication and Session Management 

 Know what Kerberos is, and how to use it, what vulnerabilities it
might have
 Know what IPSec/IKE is, the protocols it uses, and vulnerabilities
 Know what SSH is and how it works
 Know what SSL/TSL is and how it works
 Know about email system security

Extra Things 

 Know some examples of sidechannel attacks
 Know how to make mobile phones secure
 Know some mathematics as applied to cryptography (Chinese
Remainder Theorem, Euler Totient Function, etc.)
