TRAINING CATEGORIES
(Click Category to List Courses)

42 - IT-S Information Technology - Security and Audit


IT-S 160 - Cryptography

Code Start Date Duration Venue
IT-S 160 13 November 2023 5 Days Istanbul Registration Form Link
IT-S 160 04 December 2023 5 Days Istanbul Registration Form Link
Please contact us for fees

 

Course Description

This course introduce historical techniques of encryption and their cryptanalysis. It cover topics such as public key cryptography (RSA, ElGamal systems), PKI (Public Key Infrastructure), and digital certificates management. The Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) are also discussed. Participants will be able to identify digital signature schemes and key distribution. Secret sharing schemes and hash functions, Zero knowledge proofs, Integer and modular arithmetic are also among the topics discussed in the course. 

Course Objectives

  • Provide sufficient mathematical background to understand and analyze encryption/decryption algorithms
  • Prepare the participants for the challenging problems in the area of cybersecurity
  • Understand secure methods for data storage, data sharing and data transferring
  • Gain a deep knowledge of old and modern encryption techniques
  • Implement various types of public-key and private-key cryptosystems
  • Make cryptanalysis of encryption techniques
  • Learn digital signature schemes
  • Be able implement secret sharing schemes

Who Should Attend?

  • Cyber Security Engineer
  • Cyber Security Administrator
  • Anyone interested in the topic and have basic mathmatical knowledge 

Course Details/Schedule

Day 1

  • Overview of Cryptography and its Applications
  • Classical Cryptosystems
  • Shift Cipher
  • Affine Cipher
  • Block Cipher
  • Stream Cipher
  • One Time Pad

Day 2

  • Basic Number Theory
  • Basic Notations
  • Fermat Thorem
  • Euler Theorem
  • Primitive Roots
  • Finite Fields

Day 3

  • DES Symetric Block Cipher Algorithm
  • AES Symetric Block Cipher Algorithm
  • RSA Asymmetric Algorithm
  • Attacks on RSA
  • Factoring

Day 4

  • Discrete Logarithms
  • Diffie-Helman Key Exchange Algorithm
  • El-Gamal Public Key Algorithm
  • Hash Functions (MD5, SHA-x)

Day 5

  • Digital Signatures (RSA, ElGamal, DSA)
  • Birthday Attacks
  • PKI and X.509
  • SSL/TLS
  • Zero Knowledge Proof and Shamir's Secret Sharing Algorithm