Professional Documents
Culture Documents
Pertem
uan
1
Topik
Subtopik
Introduction:
Classical
encryption techniques
Computer
security
concepts;
OSI
security architecture; symmetric cipher
model; subtitution techniques
Transposition
techniques;
rotor
machines; steganography; block ciphers
principles
Feistel Cipher; DES encryption and
decryption; strength of DES; differential
& linear cryptanalysis; block cipher
design principes; Euclidean algorithm;
modular arithmetic; group, rings, fields
Galois fields; polynomial arithmetic
AES encryption and decryption; AES
implementation
Block
cipher
modes;
multiple
encrytpion; triple DES; pseudorandom
number generators; stream ciphers; RC4
Classicial
encryption
techniques; Block ciphers
DES
(Data
Encryption
Standard); Number theory
4
5
Finite fields
AES (Advanced Encryption
Standard)
Block cipher modes of
opertions; Pseudorandom
number
generation;
Stream ciphers
UTS
Public-key cryptography
7
8
9
Other
cryptography
public-key
10
Crytographic
hash
functions;
Message
Authentication Codes
11
Digital signatures
12
Key management;
authentication
13
Network
and
security;
Engineering
UAS
14
User
internet
Security