[vc_row el_class=”inner-body-content” css=”.vc_custom_1666782260148{padding-top: 30px !important;padding-bottom: 20px !important;}”][vc_column][vc_custom_heading text=”Pre-requisite(s)” font_container=”tag:h3|font_size:20px|text_align:left” use_theme_fonts=”yes” css=”.vc_custom_1666782238431{margin-top: 0px !important;}”][vc_column_text]None[/vc_column_text][vc_custom_heading text=”Recommended Book(s)” font_container=”tag:h3|font_size:20px|text_align:left” use_theme_fonts=”yes”][vc_column_text]

[/vc_column_text][vc_custom_heading text=”Reference Book(s)” font_container=”tag:h3|font_size:20px|text_align:left” use_theme_fonts=”yes”][vc_column_text]

[/vc_column_text][vc_custom_heading text=”COURSE OBJECTIVES” use_theme_fonts=”yes”][vc_column_text]The focus of this course will be on how the cryptographic techniques and protocols can be used to can be used to secure the most valuable asset ‘information’ when it is transmitted electronically over a public network.[/vc_column_text][vc_custom_heading text=”COURSE LEARNING OUTCOMES (CLO)” use_theme_fonts=”yes”][vc_column_text]After completing this course, students will be able to
•    Understand meaning of cryptography and cryptanalysis
•    Learn mathematical concepts in number theory, algebra and complexity theory that are applied to modern cryptographic algorithms
•    Explain various cryptographic methods like Private Key Encryption, Public Key Encryption, Hash Functions, Digital Signatures, Pseudo Random Numbers, Key Management, Message Authentication etc.[/vc_column_text][vc_custom_heading text=”COURSE CONTENTS” use_theme_fonts=”yes”][vc_column_text css=”.vc_custom_1666782224725{margin-bottom: 0px !important;}”]

[/vc_column_text][/vc_column][/vc_row]