(Click Category to List Courses)
42 - IT-S Information Technology - Security and Audit
IT-S 160 - Cryptography
Code | Start Date | Duration | Venue | |
---|---|---|---|---|
IT-S 160 | 02 December 2024 | 5 Days | Istanbul | Registration Form Link |
IT-S 160 | 24 February 2025 | 5 Days | Istanbul | Registration Form Link |
IT-S 160 | 21 April 2025 | 5 Days | Istanbul | Registration Form Link |
IT-S 160 | 16 June 2025 | 5 Days | Istanbul | Registration Form Link |
IT-S 160 | 11 August 2025 | 5 Days | Istanbul | Registration Form Link |
IT-S 160 | 06 October 2025 | 5 Days | Istanbul | Registration Form Link |
IT-S 160 | 01 December 2025 | 5 Days | Istanbul | Registration Form Link |
Course Description
This course introduce historical techniques of encryption and their cryptanalysis. It cover topics such as public key cryptography (RSA, ElGamal systems), PKI (Public Key Infrastructure), and digital certificates management. The Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are also discussed. Participants will be able to identify digital signature schemes and key distribution. Secret sharing schemes and hash functions, Zero knowledge proofs, Integer and modular arithmetic are also among the topics discussed in the course.
Course Objectives
- Provide sufficient mathematical background to understand and analyze encryption/decryption algorithms
- Prepare the participants for the challenging problems in the area of cybersecurity
- Understand secure methods for data storage, data sharing and data transferring
- Gain a deep knowledge of old and modern encryption techniques
- Implement various types of public-key and private-key cryptosystems
- Make cryptanalysis of encryption techniques
- Learn digital signature schemes
- Be able implement secret sharing schemes
Who Should Attend?
- Cyber Security Engineer
- Cyber Security Administrator
- Anyone interested in the topic and have basic mathmatical knowledge
Course Details/Schedule
Day 1
- Overview of Cryptography and its Applications
- Classical Cryptosystems
- Shift Cipher
- Affine Cipher
- Block Cipher
- Stream Cipher
- One Time Pad
Day 2
- Basic Number Theory
- Basic Notations
- Fermat Thorem
- Euler Theorem
- Primitive Roots
- Finite Fields
Day 3
- DES Symetric Block Cipher Algorithm
- AES Symetric Block Cipher Algorithm
- RSA Asymmetric Algorithm
- Attacks on RSA
- Factoring
Day 4
- Discrete Logarithms
- Diffie-Helman Key Exchange Algorithm
- El-Gamal Public Key Algorithm
- Hash Functions (MD5, SHA-x)
Day 5
- Digital Signatures (RSA, ElGamal, DSA)
- Birthday Attacks
- PKI and X.509
- SSL/TLS
- Zero Knowledge Proof and Shamir's Secret Sharing Algorithm