Cryptography

Learning Outcome (LO) Summary: Understand and apply the fundamental principles of cryptography to ensure the confidentiality, integrity, availability, and non-repudiation of data, while recognizing and utilizing cryptographic methods and secure protocols in practical scenarios.

Component Learning Outcomes

ID Component Learning Outcomes (LOs) Cross-Cutting Concepts
DS1 Explain cryptography including its relationship to confidentiality, integrity, and availability of data. [Guidance] CIA
DS2 Encrypt a small data set using a simple encryption algorithm. [Guidance] CIA
DS3 Describe basic cryptography terms, including ciphers, cryptographic keys, encrypt, decrypt, cryptanalysis, cryptographic hashing, non-repudiation, and cryptology. [Guidance] CIA
DS4 Use symmetric ciphers with a shared secret key to transform plaintext to ciphertext. [Guidance] CIA
DS5 Use asymmetric ciphers with a public key to transform plaintext to ciphertext. [Guidance] CIA
DS6 Use cryptographic hash functions to create one-way transformations that convert data of arbitrary length into fixed-length hash values. [Guidance] CIA
DS7 Recognize secure protocols, like HTTPS and SSH, which use cryptography to protect communication. [Guidance] CIA

Systems thinking

Adversarial thinking

DS8 Recognize the critical role of key management and public key infrastructure (PKI) for ensuring the secure generation, distribution, and storage of cryptographic keys. [Guidance] CIA

Systems thinking

Suggestions Accepted for consideration for the next Edition:

Please provide your suggestions about this topic area. All submitted comments will be reviewed at the end of the month. Comments accepted for inclusion will be listed above.

Leave a Reply

Your email address will not be published. Required fields are marked *