This lesson plan outlines the schedule and topics to be covered for a Cryptography and Network Security course taught over 13 weeks. The course will cover classical cryptosystems like substitution and transposition ciphers in the first few weeks. It will then cover private/symmetric key cryptography including DES and AES. Later weeks will focus on public key cryptography including RSA and elliptic curve cryptography. The course will also cover network security topics such as firewalls, IDS, VPNs and wireless security. Number theory concepts will be introduced to provide the mathematical foundations for cryptographic techniques.
This lesson plan outlines the schedule and topics to be covered for a Cryptography and Network Security course taught over 13 weeks. The course will cover classical cryptosystems like substitution and transposition ciphers in the first few weeks. It will then cover private/symmetric key cryptography including DES and AES. Later weeks will focus on public key cryptography including RSA and elliptic curve cryptography. The course will also cover network security topics such as firewalls, IDS, VPNs and wireless security. Number theory concepts will be introduced to provide the mathematical foundations for cryptographic techniques.
This lesson plan outlines the schedule and topics to be covered for a Cryptography and Network Security course taught over 13 weeks. The course will cover classical cryptosystems like substitution and transposition ciphers in the first few weeks. It will then cover private/symmetric key cryptography including DES and AES. Later weeks will focus on public key cryptography including RSA and elliptic curve cryptography. The course will also cover network security topics such as firewalls, IDS, VPNs and wireless security. Number theory concepts will be introduced to provide the mathematical foundations for cryptographic techniques.
Beyond Cryptographic Routing: The Echo Protocol in the new Era of Exponential Encryption (EEE): - A comprehensive essay about the Sprinkling Effect of Cryptographic Echo Discovery (SECRED) and further innovations in cryptography around the Echo Applications Smoke, SmokeStack, Spot-On, Lettera and GoldBug Crypto Chat Messenger addressing Encryption, Graph-Theory, Routing and the change from Mix-Networks like Tor or I2P to Peer-to-Peer-Flooding-Networks like the Echo respective to Friend-to-Friend Trust-Networks like they are built over the POPTASTIC protocol