CS5288 - Cryptography: Theory and Practice | ||||||||||
| ||||||||||
* The offering term is subject to change without prior notice | ||||||||||
Course Aims | ||||||||||
The course provides an in-depth study of cryptographic techniques and their role in practical computer systems and applications. It covers the algorithms for symmetric and asymmetric encryption, hash functions, and pseudo random number generation; and the protocols to achieve practical security objectives such as confidentiality, authentication, data integrity, non-repudiation. Associated protocols such as key distribution and public key infrastructure systems will also be dealt with. | ||||||||||
Assessment (Indicative only, please check the detailed course information) | ||||||||||
Continuous Assessment: 30% | ||||||||||
Examination: 70% | ||||||||||
Examination Duration: 2 hours | ||||||||||
Detailed Course Information | ||||||||||
CS5288.pdf | ||||||||||
Useful Links | ||||||||||
Department of Computer Science |