Intended learning outcomes
Students who successfully complete this course unit should be able to:
- List the different mechanisms for information protection and main objectives (confidentiality, data integrity) and problems (key space size, key generation) of modern cryptography.
- Describe some of the key application areas of number theory, such as public key encryption, block ciphers and hash functions, and blockchain infrastructures.
- Identify existing vulnerabilities in the software and use techniques appropriate to their mitigation or correction
- Explain the cryptographic mechanisms available on modern hardware platforms.
- Identify different systems for detecting and preventing security breaches.
- Identify the different existing regulatory frameworks.
- Conduct a risk analysis and definition of threats.