Course Information

Course Title:

Cryptography and Security Mechanisms

Course Number:

SEC577

Course Description:

This course provides an overview of cryptography, focusing on information systems security issues and mechanisms and devices to address these issues. Also examined are cryptosystems, algorithms, and certificates. Students gain applications-oriented experience in developing and implementing several cryptography applications or algorithms. Access controls are presented as a collection of security mechanisms that work together to protect an information system's assets. Additionally, students complete lab assignments and a term project.

Course Prerequisites:

SEC571 or a technical undergraduate degree and/or associated professional experience with preparation equivalent to or beyond SEC571.

Course Specific Requirements

Enter content here, if necessary.

Software Citation Requirements

This course uses open-source software, and as the end users of this software, students are required to cite the software for any student work, such as assignments, labs, or projects, where the software has been utilized. Open-source software does have end-user license agreements, and all students should read the entire agreement for a software prior to installation or usage. In order to use the software in this course, software citations have been created for students and can be located on the Open Source Applications page. These software citations must be included in all student work submissions that have used the software.

Textbooks and Resources

Required Textbooks

The following books are required for this course:

RSA Security's Official Guide to Cryptography

by Steve Burnett and Stephen Paine

McGraw-Hill/Osborne


 

E-book Details

First Time Using VitalSource?

Step 1: View the VitalSource Video

Step 2: Register with VitalSource Bookshelf Online

  1. Click the cover or title of your eBook. A new window will open.
  2. Enter email address and password. Bookshelf Online will open.

Step 3: Access the Desktop and Mobile Versions

You must complete Step 2 prior to using the desktop or mobile versions.

Already Registered?   3 Ways to Access Your eBooks

Bookshelf

Online

Access your eBook by clicking on the book cover or title in the syllabus page. Bookshelf Online will open.

Desktop devices

Desktop

Download your eBooks and use them whether you're connected to the Internet or not.

Mobile devices

Mobile

Download the app and get your eBooks on your iPhone, iPad, or Android device.

Campus Additional Information

Enter content here, if necessary.

Terminal Course Objectives

DeVry University course content is constructed from curriculum guides developed for each course that are in alignment with specific Terminal Course Objectives. The Terminal Course Objectives (TCOs) define the learning objectives that the student will be required to comprehend and demonstrate by course completion. The TCOs that will be covered in detail each week can be found in the Objectives section for that particular week. Whenever possible, a reference will be made from a particular assignment or discussion back to the TCO that it emphasizes.

A

Given the need for secure communications and data storage, understand the need for cryptography and its management implications. Included is a close examination of symmetric-key cryptography and symmetric-key management. Current applications, advantages, and limitations are evaluated in real-world settings.

B

Given the need for secure public communications between anonymous parties, learn, evaluate, and apply the current public-key cryptography techniques. Included are the public-key cryptography algorithms from dominant sources, such as RSA, DH, and ECDH (Elliptic Curve Diffie-Hellman). Understand and manage the real-world events associated with key distribution, key protection, and trusted third parties.

C

Given the need to authenticate the origin and creator of a secure communication, learn and apply digital signature technology in the current messaging environment. Extend this knowledge to key protection, key recovery, certificates, and encryption algorithms.

D

Given the need to deliver and manage secure communications between devices and individuals, learn, evaluate, and apply the standards for Public-Key Infrastructures (PKI). Focus is given to PKI authorities, protocols, key architecture, and trust models.

E

Given the need for secure communications across a wide array of devices and networks, evaluate and apply security protocols at the network and transport levels. Special attention is given to SSL (Secure Sockets Layer), database security, Internet key exchange, and handshaking. Additionally, application layer security is evaluated through the use of S/MIME (Secure/Multipurpose Internet Mail Extensions) and SET (Secure Electronic Transaction).

F

Given the requirement to deploy sophisticated security solutions, learn how specialized hardware can be integrated with advanced software cryptography. Special focus is given to current hardware, such as Smart Cards, JavaCards, and Biometrics. The offers from dominant vendors are evaluated. Additionally, the legal environment is also explored with respect to security hardware and software.

G

Given the requirement to apply the best security and cryptography practices across an enterprise, compare, contrast, and evaluate real-world solutions that have advanced this science. Special focus is given to learning from past mistakes, as well as current achievements.

Lab Schedule

Week 1

None
Citrix
RKON
Skillsoft
Toolwire
WebServer
ACC COMAT
ACC NonCOMAT
CWP

Week 2

None
Citrix
RKON
Skillsoft
Toolwire
WebServer
ACC COMAT
ACC NonCOMAT
CWP

Week 3

None
Citrix
RKON
Skillsoft
Toolwire
WebServer
ACC COMAT
ACC NonCOMAT
CWP

Week 4

None
Citrix
RKON
Skillsoft
Toolwire
WebServer
ACC COMAT
ACC NonCOMAT
CWP

Week 5

None
Citrix
RKON
Skillsoft
Toolwire
WebServer
ACC COMAT
ACC NonCOMAT
CWP

Week 6

None
Citrix
RKON
Skillsoft
Toolwire
WebServer
ACC COMAT
ACC NonCOMAT
CWP

Week 7

None
Citrix
RKON
Skillsoft
Toolwire
WebServer
ACC COMAT
ACC NonCOMAT
CWP

Week 8

None
Citrix
RKON
Skillsoft
Toolwire
WebServer
ACC COMAT
ACC NonCOMAT
CWP

Course Schedule

Week, TCOs, and TopicsReadings and Class PreparationActivities and Assignments

Week 1
TCO A

The Need for Cryptography

Chapter 1: Why Cryptography?

Chapter 2: Symmetric-Key Cryptography

Chapter 3: Symmetric-Key Management

Graded discussion topics

Begin Part A of Course Project

Week 2
TCO B

Key Distribution and Public-Key Cryptography

Chapter 4: Key Distribution Problem and Public-Key Cryptography

Graded discussion topics



Week 3
TCO C

The Digital Signature

Chapter 5: The Digital Signature

Graded discussion topics


Week 4
TCO D

PKI and the X.509 Standard

Chapter 6: Public-Key Infrastructure and the X.509 Standard

Graded discussion topics

Submit Part A of Course Project

Week 5
TCO E

Network/Transport/Application-Layer Security Protocols

Chapter 7: Network and Transport Security Protocols

Chapter 8: Application-Layer Security Protocols

Graded discussion topics

Begin Part B of Course Project

Midterm

Week 6
TCO F

Overcoming Software Limitations With Hardware

Chapter 9: Hardware Solutions: Overcoming Software Limitations

Graded discussion topics

Week 7
TCO G

The Break-Ins and Following Standards

Chapter 11: Doing it Wrong: The Break-ins

Chapter 12: Doing it Right: Following Standards

Graded discussion topics

Submit Part B of Course Project

Week 8
All TCOs
Final Exam

Blended E-Learning

This course is an 8-week, intensive course that includes both classroom-based and e-learning activities. Your participation in both areas is essential to your success in this course. You should expect to spend time each week participating in the prescribed activities both before and after our class meeting.

Participation before, during, and after class meetings is critical to your success in this intensive environment.

To get the most out of our weekly class meetings, it is essential that you come to class prepared. The weekly readings listed in the Course Schedule will prepare you for class. Our class meetings, in turn, will prepare you for upcoming exams and assignments.

Through the DeVry e-learning platform, you will be able to

  • review the Syllabus and weekly assignment information;
  • submit completed work for grading;
  • take quizzes and exams;
  • obtain copies of class handouts and notes;
  • e-mail the instructor and other students; and
  • participate in online discussion of class material.

iConnect Live

This course contains iConnect Live sessions that provide students with the opportunity to attend live presentations, which cover course materials, projects, and assignments. Please see the iConnect Live items for the days and times of the live sessions and for the link to enter each session. You will also receive e-mail reminders each week.

If you are unable to attend the live session, you can watch the recorded session by clicking on the Recordings link that will appear in the iConnect Live item after the lecture has concluded. Please contact your instructor with any questions.

Please note that because of unavoidable technological issues and presenter availability, the live lectures may be substituted with prerecorded lectures.

Due Dates for Assignments & Exams

Unless otherwise specified, the following applies.

  • Access to most weeks begins on Sunday at 12:01 a.m. mountain time (MT).
  • All assignments are to be submitted on or before Sunday at the end of the specified week that they are due, by 11:59 p.m. (MT).
  • All quizzes and exams are to be completed on or before Sunday at the end of the specified week that they open, by 11:59 p.m. (MT).

Note: Week 8 opens at 12:01 a.m. (MT) on the ending Sunday of Week 7. Any assignments or exams must be completed by 11:59 p.m. (MT) Saturday of the eighth week.

Due Dates for Assignments & Exams

All assignments, quizzes, and exams are to be completed per the schedule indicated by your instructor.

Assignment Values and Letter Grades

The maximum score in this class is 1,000 points. The categories, which contribute to your final grade, are weighted as follows.

AssignmentPointsWeighting
Discussions (30 points, Weeks 1-7)210
21%
Course Project Part A (Week 4)210
21%
Course Project Part B (Week 7)235
23.5%
Midterm110
11%
Final Exam235
23.5%
Total Points1,000100%

All of your course requirements are graded using points. At the end of the course, the points are converted to a letter grade using the scale in the table below.

Final grades are based on the percentage equivalent in the chart below and are not rounded to the next higher letter grade.

Letter GradePointsPercentage
A  930–1,00093% to 100%
A- 900–92990% to 92.9%
B+870–89987% to 89.9%
B  830–86983% to 86.9%
B- 800–82980% to 82.9%
C+770–79977% to 79.9%
C  730–76973% to 76.9%
C- 700–72970% to 72.9%
D+670–69967% to 69.9%
D  630–66963% to 66.9%
D- 600–62960% to 62.9%
F  599 and belowBelow 60%

DeVry Graduate Academic Policy and Relevant Resources

DeVry Undergraduate Academic Policy and Relevant Resources

Frequently Asked Questions

When are grades calculated, and how can I view my grades?

  • You must complete any quizzes and post your written assignments (if necessary) to the weekly Dropbox by Sunday 11:59 p.m. (MT) each week, except Week 8 which closes at 11:59 p.m. (MT) Saturday.
  • Once your work is reviewed, you should see comments and total points for each assignment in the Gradebook. Instructors should have Discussion work graded by the following Tuesday and all other assignments by the following Friday.
  • You may check your progress at any time by going to the Gradebook, selecting the week and then your name.
  • Click on the points earned for each assignment in the Gradebook to see any instructor comments.

What should I do if a discrepancy is found with my grade?

  1. Double-check the error and try to determine what caused it.
  2. Send your instructor an email explaining your findings.
  3. Trust that any error in grading will be corrected quickly

What if I cannot get my work submitted on time?

  • If you have an emergency that will cause your work to be late, please contact your instructor in advance of the due date so that arrangements can be made. Your instructor may reserve the right to deduct points for work turned in late based on the reason and the timeliness of notice.
  • If a technical problem prevents you from meeting the scheduled due date, please contact the Help Desk at 1-800-594-2402 and immediately email your instructor about the situation.

How can I get extra credit?

Extra credit is not an option.

Questions and Concerns

Please feel free to contact me for help with coursework or other areas that may impact your progress. Here are some examples.

  • Do you have general questions about attendance, deadlines regarding your courses, student financial aid, or other areas? 
  • Are you a member of the military service? Do you need to adjust your schedule due to active duty, or do you have questions about your GI Bill® benefits or have other unforeseen military and veteran-related issues that have developed?
  • Do you need supplementary student assistance? Please let me know if you are having academic difficulty and would like an ADA accommodation. Although I can talk with you about getting assistance, an excellent point of contact is the Office of Student Disability Services. You can reach the Office by calling 877-496-9050, option 3, or by e-mailing adaofficer@devry.edu or adaofficer@keller.edu.

Regardless of your situation, please feel free to contact me for assistance in whatever area of concern you might have. I will do everything I can to assist you or put you in contact with University colleagues who are trained to assist you in whatever area of concern you might have.

"GI Bill® is a registered trademark of the U.S. Department of Veterans Affairs (VA). More information about education benefits offered by the VA is available at the official U.S. government website: www.benefits.va.gov/gibill.”

Top