Cryptography (ISEC312)

Cryptography (ISEC312)

The students in this course will be introduced to various encryption techniques and their applications. The main encryption techniques the students will learn and apply in this course are Symmetric encryption, Public-key encryption, and hash functions. These techniques will be used for digital signatures, certificate generation and verification. The performance of the various encryption techniques used will be analyzed based on certain criteria and design needs.

Learning Outcomes

At the end of the course, students will be able to :

  1. Analyze Security Threats Associated With Cryptographic Algorithms.
  2. Apply Hash Function Algorithms
  3. Discuss Contemporary Cryptography And Its Application.
  4. Evaluate Various Cryptographic Techniques.
  5. Investigate The Mathematical Concepts Required For Cryptographic Algorithms


Email: [email protected]

100% Plagiarism Free & Custom Written, Tailored to your instructions

Our Giveaways

Plagiarism Report

for د.إ50 Free


for د.إ32 Free

Title page

for د.إ20 Free


for د.إ36 Free


for د.إ19 Free

Limitless Amendments

for د.إ38 Free

Get all these features for
د.إ195.00 FREE

assignment bank giveaways

Our Ratings