Overview

This course will introduce the theoretical foundations of cryptography and link the theory to practical applications of cryptography in security and privacy. The course explains the foundational mathematical concepts and how these concepts help maintain/achieve certain security properties. The course would also provide guidance on how to stay updated with the latest standards, especially with emerging research directions such as quantum crypto. By applying these foundations to different security and privacy applications (e.g. ToR, Secure Messaging, Privacy-preserving databases, web applications), participants in this course would be able to distinguish the differences between cryptographic schemes/algorithms, the security properties they achieve and how to interpret their meaning in a practical context.

Sample instructor(s)

Hanan Hibshi

Duration

3, 6, 9 or 12 hours.

Customizable?

Yes

In-person or remote

Remote, in-person, or hybrid

Intended audience

Industry practitioners and students of any major who are new to security and privacy

Takeaways

Better practical understanding of cryptography

Course topics

  • Security and Privacy Definitions
  • Security Properties
  • History of cryptography
  • Symmetric Crypto
  • Asymmetric Crypto
  • Hash functions
  • Cryptography in practice
  • Applied crypto in SSL/TLS
  • Applied crypto in TOR
  • Applied crypto in cryptocurrencies
  • Applied crypto in secure messaging
  • Applied crypto in browsers
  • Crypto Security, cost, and performance trade-offs
  • Advanced topics and the Future of crypto
  • Quantum Crypto
  • Information-theoretic Security
  • MPC and FHE

Prerequisites

None 

Materials

Copies of presentations and case study exercises will be provided to participants.

Contact us

To learn about our custom programs and any upcoming open enrollments, reach out to Michael Lisanti.