Skip to main content
International Fees

International fees are typically three times the amount of domestic fees. Exact cost will be calculated upon completion of registration.

Course details

This course will focus on the concepts and applications of cryptography, covering topics on symmetric and asymmetric cryptography; secret key and key exchange; stream and block ciphers; message digests; public and private keys; digital signatures, digital certificates and Public Key Infrastructure (PKI); SSL, IPSec VPN's, S/MIME, PGP and WEP/WPA; cryptographic and non-cryptographic attacks; randomness and primality; cryptographic algorithms (DES, 3DES, AES, Blowfish, RSA, DSA, DH, El Gamal, ECC, MD5, SHA, RC4, etc.); and authentication, confidentiality, integrity and non-repudiation. Introduction to real-world use and applications will be included.

Prerequisite(s)

  • Admission to a Forensic credential program or permission of the Program Coordinator.

Credits

3.0

Not offered this term
This course is not offered this term. Please check back next term or subscribe to receive notifications of future course offerings and other opportunities to learn more about this course and related programs.

Learning Outcomes

Upon successful completion of this course, the student will be able to:

  • Discuss the major trends in cryptographic evolution, including legal and ethical issues.
  • Compare the strengths and weaknesses of symmetric and asymmetric algorithms, of message digest implementations, and of various cipher modes.
  • Design a simple public key algorithm.
  • Assess the strengths and weaknesses of cryptographic algorithms, such as DES, 3DES, AES, RSA, DSS, ECC, DH, RC4, etc.
  • Discuss secure implementations of practical real-world cryptographic systems such as EFS, Entrust Client, Wireless, S/MIME, SSL, PGP, VPN's, Smartcards and SSH.
  • Assess public and secret key algorithms to determine their vulnerability to common methods of attack.
  • Critically evaluate cryptographic solutions in terms of the cryptographic assurances they provide, the method of implementation, their adherence to standards, and their potential weaknesses.
  • Use cryptographic tools and solutions, including S/MIME, OpenSSL, PGP and PKI.
  • Explain the need for secure key exchange and management, and the various techniques available.
  • Compare the strengths and weaknesses of network-based (PGP) and hierarchical PKI systems (X509).

Effective as of Fall 2009

Contact Us

If you have a question or comment about this course, please complete and submit the form below.

  • Privacy Notice: The information you provide will be used to respond to your request for BCIT program information and is collected under Section 26(c) of the Freedom of Information and Protection of Privacy Act (FIPPA). For more information about BCIT’s privacy practices contact: Associate Director, Privacy, Information Access & Policy Management, British Columbia Institute of Technology, 3700 Willingdon Ave. Burnaby, BC V5G 3H2, email: privacy@bcit.ca.
  • This field is for validation purposes and should be left unchanged.

Subscribe

Interested in being notified about future offerings of Encryption (FSCT 8580)? If so, fill out the information below and we'll notify you by email when courses for each new term are displayed here.

  • Privacy Notice: The information you provide will be used to respond your request for BCIT course information and is collected under Section 26(c) of the Freedom of Information and Protection of Privacy Act (FIPPA). For more information about BCIT’s privacy practices contact: Associate Director, Privacy, Information Access & Policy Management, British Columbia Institute of Technology, 3700 Willingdon Ave. Burnaby, BC V5A 3H2, email: privacy@bcit.ca.