The aim of this course is to support the students in learning the principles, concepts and applications of cryptography.

Course Contents

  • Basic definitions and concepts; information security.
  • Symmetric cryptography.
  • Digital signatures.
  • Authentication.
  • Public key cryptography.
  • Hash functions.
  • Integrity checking.
  • Key management and random number generators.
  • Schneier B. (1996): Applied Cryptography, 2nd Edition, John Wiley & Sons.
  • Stallings W. (2006): Cryptography and Network Security, 4th Edition, Prentice Hall.


10K students