Loading...

Course Description

Protocols for authenticating machines play an important role in systems security, and this course will focus on various aspects of this challenge. Using case studies of protocols that work and that have failed will help you to acquire the skill — and the skepticism — necessary to analyze and deploy authentication protocols successfully. In this course, you will investigate shared key and public key cryptography along with the trade-offs associated with these different types of keys. You will also examine some of the standard cryptographic building blocks and their use.

The following course is required to be completed before taking this course:

  • Systems Security

Faculty Author

Fred Schneider

Benefits to the Learner

  • Define the Dolev-Yao threat model and identify three primary classes of attacks
  • Recognize when a protocol may be vulnerable to these types of attacks
  • Develop a tool kit of existing valid protocols for authentication and key distribution
  • Recognize the challenges of adapting a protocol into a real-world system
  • Evaluate the trade-offs between symmetric key cryptography and public key cryptography
  • Analyze different approaches to distributing and revoking keys

Target Audience

  • IT professionals
  • Developers
  • Programmers
  • Analysts
  • Software engineers
  • Cybersecurity professionals

Accrediting Associations

Applies Towards the Following Certificates

Loading...
Cornell Computing and Information Science
Thank you for your interest in this course. Unfortunately, the course you have selected is currently not open for enrollment. Please complete a Course Inquiry so that we may promptly notify you when enrollment opens.
Required fields are indicated by .