Skip to main content

IT&C 585

Encryption Implementation

Electrical and Computer Engineering Ira A. Fulton College of Engineering

Course Description

Encryption as a means for protecting data. How to implement encryption to accomplish security objectives. Selection of appropriate algorithms and protocols. Legal and regulatory requirements related to encryption.

When Taught

Fall

Grade Rule

Grade Rule 10: A, B, C, D, E, T, I (Standard grade rule with a T option)

Fixed

3

Fixed

2

Fixed

3

Recommended

Graduate status or sufficient cybersecurity experience from a course such as IT&C 366, IS 414, CS 465, or MATH 485.

Title

Encryption Application

Learning Outcome

Explain the purpose of encryption, including common security problems that encryption can solve and those security problems that are not appropriate for encryption.

Title

Encryption Key Management

Learning Outcome

Explain the importance of encryption key management in the security of the encryption implementation. Describe each phase of a key’s life and the security concerns for each.

Title

Implementation

Learning Outcome

Implement common industry encryption systems in controlled environments.

Title

Standards

Learning Outcome

Explain applicable industry standards and regulations governing implementation of encryption.