Course Description:

  • Cryptography (or cryptology; derived from Greek ?????? krýpto "hidden" and the verb ????? gráfo "to write" or ?????? legein "to speak") is the practice and study of hiding information. In modern times, cryptography is considered a branch of both mathematics and computer science, and is affiliated closely with information theory, computer security, and engineering.
  • Cryptography offers a set of sophisticated security tools for a variety of problems, from protecting data secrecy, through authenticating information and parties, to more complex multi-party security implementation.
  • Deep understanding of the mathematics of number theory or “Experimental Mathematics” is a fundamental requirement to be successful in this field
  • This course will take you through the basics of number theory. Upon completing the course you will be able indulge in your taste crypto-security.


  • CDS300 - Course Description:
    This course is meant for college students, IT professionals and individuals interested in cryptographic technology. It seeks to help students/trainees become knowledgeable in cryptography, symmetric keys, PKI, key management, digital signatures, etc. The intent of this training is to teach symmetric (private) keys, asymmetric (public) keys cryptosystems, PKI, digital signatures, digital certificates, the significance of cryptography in data protection efforts, basic cryptographic techniques, the importance of key management life cycles, the importance of centralized key management and its extension to identity management and single-sign-on (SSO), and awareness of the potential pitfalls and risks when using encryption. Topics to be covered: Theory of cryptography; Symmetric keys and asymmetric keys,; DES, Triple DES, and AES; Other cryptography algorithms; ECC; Quantum cryptography; PKI; Digital signatures and digital envelope; CA, RA, and CRL; Key management & SSO; Risks of encryption. PREQ: Good knowledge of mathematics.


  • CIS305 - Course Description:
    This course is suitable for students & IT professionals interested to advance their career in advance information security.
    Elliptic Curve Cryptography (ECC) is today emerging as an attractive public-key cryptosystem for hand-held portable devices. Compared to traditional cryptosystems like RSA, ECC offers equivalent security with smaller key sizes, which results in faster computations; lower power consumption, as well as memory and bandwidth savings. This is attractive to mobile/wireless environments which are typically limited in terms of their CPU, power and network connectivity. In this course you will learn advance number theory and algorithms and necessary gain capabilities to work in the new field of experimental mathematics needed to implement ECC. You will also learn other functionality of ECC, its advantages and challenges over other cryptosystems. Comparison with other cryptographic systems will also be undertaken based on aspects such as efficiency, size of the key needed to attain a certain level of security (this has implications on computational costs and time), known and probable attacks, current and predicted future (based on the current growth of technology) and their prevention techniques. ECC reliability will also be looked into. PREREQ: Advance computing and Mathematics & CIS301.


  • CIS301 - Course Description:
    This course is suitable for people interested to pursue career in the world of advance information security.
    Cryptography (or cryptology; derived from Greek "hidden" and the verb "to write" or "to speak") is the practice and study of hiding information. In modern times, cryptography is considered a branch of both mathematics and computer science, and is affiliated closely with information theory, computer security, and engineering. But it’s now, more closely referred to as experimental mathematics. This course will take you through the basics of number theory & its application to cryptography. History & key advances in private key (DES, AES etc.) & public key (RSA, DSA, ElGamal etc.) cryptosystems and algorithms. Steganography; Message Digest, Authentication, Digital Signature & Certificate; Data encryption and security. Upon completing the course you will be able to indulge in building your own advance crypto-security engine. PREREQ: Advance computing and Mathematics.