Abstract
Cryptography, the science of "secret writing" is being exploited more extensively by the I.T. community in order to provide data confidentiality and to satisfy multiple regulatory requirements. Cryptography is also a component in other elements of the security infrastructure, including authentication/authorization, identity management, data integrity, and non-repudiation. Cryptographic methods and associated best practices are essential elements of a successful, modern business. Cryptography comes in two flavors: symmetric cryptography for high-speed and bulk encryption, asymmetric (or public-key) cryptography for instantaneous, shorter, yet secure encryption. The state-of-the-art cryptography standards and methods for both flavors will be reviewed, with a eye toward how each technology is integrated into an overall I.T. strategy. A brief, historical perspective on cryptography will be included.
Learning Objectives
Understand the basic algorithms of cryptography, both symmetric and asymmetric
Appreciate the role of cryptography in the overall security infrastructure
Learn how cryptography helps satisfy business objectives