ICT211_StudyGuide_Jul10 - ICT211 Encryption Techniques and...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
ICT211 Encryption Techniques and System Security Study Guide (5CU)
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Course Development Team Head of Programme : Mr. V. V. Moorthy Course Developer(s) : Dr. Poo Gee Swee Production : Educational Technology & Production Team Curriculum Administration Team Copyright © SIM University, 2010 All rights reserved. No part of this material may be reproduced in any form or by any means without permission in writing from the Educational Technology & Production, SIM University. Educational Technology & Production SIM University 535A Clementi Road Singapore 599490
Background image of page 2
CONTENTS SECTION 1: COURSE GUIDE 1.1 Introduction ......................................................................................................... 1 1.2 Course Description and Aims ........................................................................... 2 1.3 Learning Outcomes ............................................................................................ 2 1.4 Overall Assessment ............................................................................................ 3 1.5 Learning Materials .............................................................................................. 4 1.6 Course Schedule for 5 CU Print Courses ........................................................ 7 SECTION 2: STUDY UNITS STUDY UNIT 1 Summary of Unit 1··························································································SU1-1 Study Guide for Unit 1 Chapter 1: Introduction··················································································SU1-3 1.1 Introduction 1.2 A Common Framework 1.3 Security Attacks 1.4 Security Services and Mechanisms Chapter 2: Symmetric Encryption & Message Confidentiality ·············SU1-7 2.1 Introduction – Some simple ways to protect Message Confidentiality 2.2 Encryption & Decryption 2.3 Important Requirements & Observations 2.4 Different Types of Algorithms 2.5 Cryptanalysis 2.6 Well Known Encryption Algorithms 2.7 Location of Encryption Devices 2.8 Key Distribution Self Assessment Questions·········································································SU1-26 Answers to Self Assessment Question·····················································SU1-29
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
STUDY UNIT 2 Summary of Unit 2··························································································SU2-1 Study Guide for Unit 2 Chapter 3: Public Key Cryptography and Message Authentication·····SU2-3 3.1 Introduction – what is Message Authentication? 3.2 Approaches to Message Authentication
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 09/06/2010 for the course IT ICt211 taught by Professor Tan during the Spring '10 term at Singapore Institute of Management.

Page1 / 13

ICT211_StudyGuide_Jul10 - ICT211 Encryption Techniques and...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online