Cryptography

This module explores cryptography, focusing on the techniques used to secure communication through encryption. It covers key concepts such as symmetric and asymmetric encryption, cryptographic protocols, and the application of cryptography in securing data.

Portal > Cybersecurity > Cryptography

Curriculum Builder

Kaufman, Charlie, Perlman, Radia, and Mike Speciner. “Network security: private communication in a public world.” Prentice Hall, 2nd ed, 2002.

Hopkin, Paul. “Fundamentals of risk management: Understanding, Evaluating and Implementing Effective Risk Management” Kogan Page, 5th ed. 2018.

Alexander, David, Finch, Amanda, and David Sutton “Information security management principles,” 2nd ed, British Computer Society 2013.

Stallings, W., “Cryptography and Network Security: Principles and Practice” 7th ed., Pearson, 2017.

Stinson, D. R. and M. B. Paterson. “Cryptology: Theory and practice,” 4th Edition. Boca Raton, FL: Chapman & Hall/CRC Press, 2019.

Adams, Carlisle, and Steve Lloyd. “Understanding PKI: Concepts, Standards, and Deployment Considerations,” 2nd edition, Boston, Mass: Addison-Wesley, 2003.

Katz, Jonathan, and Yehuda Lindell. “Introduction to Modern Cryptography.” 2nd ed, Chapman and Hall/CRC, 2014.

Stransky et al. “On the Limited Impact of Visualizing Encryption: Perceptions of {E2E} Messaging Security.” In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021) (pp. 437-454), 2021.

Menezes, Alfred J., van Oorschot, Paul C., and Scott A. Vanstone. “Handbook of Applied Cryptography,” digital sample chapters, CRC Press, 2007.