Overview
This course will introduce the theoretical foundations of cryptography and link the theory to practical applications of cryptography in security and privacy. The course explains the foundational mathematical concepts and how these concepts help maintain/achieve certain security properties. The course would also provide guidance on how to stay updated with the latest standards, especially with emerging research directions such as quantum crypto. By applying these foundations to different security and privacy applications (e.g. ToR, Secure Messaging, Privacy-preserving databases, web applications), participants in this course would be able to distinguish the differences between cryptographic schemes/algorithms, the security properties they achieve and how to interpret their meaning in a practical context.
Sample instructor(s)
Duration
3, 6, 9 or 12 hours.
Customizable?
Yes
In-person or remote
Remote, in-person, or hybrid
Intended audience
Industry practitioners and students of any major who are new to security and privacy
Takeaways
Better practical understanding of cryptography
Course topics
- Security and Privacy Definitions
- Security Properties
- History of cryptography
- Symmetric Crypto
- Asymmetric Crypto
- Hash functions
- Cryptography in practice
- Applied crypto in SSL/TLS
- Applied crypto in TOR
- Applied crypto in cryptocurrencies
- Applied crypto in secure messaging
- Applied crypto in browsers
- Crypto Security, cost, and performance trade-offs
- Advanced topics and the Future of crypto
- Quantum Crypto
- Information-theoretic Security
- MPC and FHE
Prerequisites
None
Materials
Copies of presentations and case study exercises will be provided to participants.
Contact us
To learn about our custom programs and any upcoming open enrollments, reach out to Michael Lisanti.