Course Description

Applied cryptography, key management, data protection, and post-quantum cryptography.

Learning Objectives

Upon successful completion of this course, students will be able to:

  1. Apply cryptographic mechanisms appropriately
  2. Design key management strategies
  3. Evaluate post-quantum cryptography migration considerations

Course Schedule

Week Topic
1-4 Cryptographic Foundations and PKI
5-8 Secure Protocols and Key Management
9-10 Quantum Threats and Post-Quantum Cryptography
11-12 Cryptographic Risk Analysis Project

Assessment & Grading

Assessment Weight
Problem Sets 30%
Applied Cryptography Project 40%
Participation 30%

Required Textbooks

  • Cryptography Engineering and selected NIST standards