Cryptology for IT specialists
This course is tailored for specialists interested in learning more about cryptology and its application in modern IT technologies.
The first part provides participants with a basic understanding of security problems addressed by cryptology, illustrated with historical examples and methods of cryptanalysis. The second part covers block ciphers and issues related to encryption key exchange. Asymmetric cryptology is introduced in the third part of the course. The final part explores the use of cryptology in modern telecommunication systems, including the Internet and mobile networks.
Content
- Introduction: Cryptographic methods in information security.
- Cipher reliability: Some methods of cryptanalysis.
- Block ciphers - Usage modes - Synthesis principles.
- Key distribution problem.
- Asymmetric ciphers.
- Digital signature schemes.
- Cryptographic hash functions.
- Cryptology in telecommunication protocols. Public keys certificates.
- Mobile networks security.
Learning Outcomes
Upon completion of the course, learners will be able to:
- Understand cryptography concepts.
- Understand modern block ciphers used in telecommunications.
- Understand the Idea of asymmetric encryption, digital signature, and cryptographic hash functions.
- Understand cryptology in the modern telecommunication systems.
Training Method
Presentation
Certification
Certificate of ParticipationPrerequisites
No specialized knowledge is required. However, familiarity with basic mathematical concepts (such as modular arithmetic) and fundamental programming concepts (like bits and bytes) may help in understanding the material more effectively.
Planning and location
09:30 - 12:30
09:30 - 12:30
09:30 - 12:30
09:30 - 12:30