Introduction to Cryptography

Course Provider

School of Computer Science and Engineering (SCSE)

Certification

FlexiMasters

Academic Unit

1

Introduction

Cryptography serves as the cornerstone of cybersecurity and privacy. Classical cryptography primarily addresses the security and privacy of data while it is in transit. In contrast, contemporary cryptography has broadened its application to encompass safeguarding security and privacy in various aspects of digital communication, computation, automation, interaction, transaction, and data preservation.

In this course, learners will acquire a solid grounding in the essentials of symmetric key ciphers, hash functions, and public key ciphers. They will gain a comprehensive understanding of encryption and authentication mechanisms commonly employed in practical settings. Moreover, the course delves into the critical examination of these cryptographic systems, identifying vulnerabilities and potential attack vectors. Consequently, learners will learn how to effectively employ cryptographic tools within sight and proficiency.

Ultimately, this course equips learners with the technical knowledge and skills necessary to appreciate the myriad applications of cryptography within the field of cybersecurity.

 

    This course is part of:

    - Graduate Certificate in Cybersecurity and Digital Trust
    - FlexiMasters in Cybersecurity and Digital Trust

    Learners are encouraged to complete the following core courses before enrolling in the remaining courses:

    1. Foundations of Cybersecurity (1 AU)
    2. Basic Cybersecurity Risk Management (1 AU)
    3. Intermediate Cybersecurity Risk Management (1 AU)

     


    Learners will be exposed to both private and public key cryptography, but without the indepth technical and mathematical details, on how different cryptographic algorithms work and how they can be used for 
    1. protecting data confidentiality 
    2. digital signatures 
    3. maintaining the integrity of data and communication 
    4. considerations of the potential sources of vulnerabilities so that cryptography can be 
    put to effective use. 

    At the end of the course, learners will be able to: 

    • describe how cryptographic algorithms work
    • identify the problems associated with the application of cryptography in real-world scenarios, and
    • explain the operation of various cryptographic mechanisms. 

    Learners will be exposed to both private and public key cryptography, but without the indepth technical and mathematical details, on how different cryptographic algorithms work and how they can be used for 
    1. protecting data confidentiality 
    2. digital signatures 
    3. maintaining the integrity of data and communication 
    4. considerations of the potential sources of vulnerabilities so that cryptography can be 
    put to effective use. 

    This programme is suitable for participants working/ intending to work in the cybersecurity industry. Prior knowledge in Science, Technology, Engineering and Mathematics (STEM) modules will be an advantage.

    Learners are encouraged to complete the following core courses before enrolling in the remaining courses:

    1. Foundations of Cybersecurity (1 AU)
    2. Basic Cybersecurity Risk Management (1 AU)
    3. Intermediate Cybersecurity Risk Management (1 AU)

    Standard Course Fee: S$2,180

    SSG Funding Support

     Course fee

    Course fee payable after SSG funding, if eligible under various schemes

     

    BEFORE funding & GST

    AFTER funding & 9% GST

    Singapore Citizens (SCs) and Permanent Residents (PRs) (Up to 70% funding)

    S$2,000.00

    S$654.00

    Enhanced Training Support for SMEs (ETSS)

    S$254.00

    SCs aged ≥ 40 years old
    SkillsFuture Mid-career Enhanced Subsidy (MCES)
    (Up to 90% funding)

    • Standard course fee is inclusive of GST.
    • NTU/NIE alumni may utilise their $1,600 Alumni Course Credits. Click here for more information.

     

    Read more about funding

    Assoc Prof Anwitaman Datta

    Dr. Anwitaman Datta is currently an associate professor in the School of Computer Science and Engineering at NTU, 
    with a joint courtesy appointment with the School of Physical and Mathematical Sciences. Additionally, he serves as a Senior Scientific Officer in a consulting role with a fintech start-up QPQ.IO and had previously been a nonexecutive director of Qiv Storage which he had co-founded. He obtained his PhD from the Swiss Federal Institute of Technology, Lausanne (EPFL) in Switzerland, and before that, a Bachelor of Technology from the Indian Institute of Technology (IIT 
    Kanpur). His research expertise is in the areas of distributed systems (e.g., blockchains), security & privacy  and applications of data science. At NTU, he teaches several specialized courses spanning the Cybersecurity and Data Science domains, at the undergraduate as well as master's and PhD levels, including courses aimed at working professionals pursuing life-long learning. Outside NTU, he has conducted guest courses in several European and Asian universities, including at KTH Stockholm (Sweden), University of Warsaw (Poland), University of Calcutta (India), IIT Indore (India) and Technion (Israel), as well as training courses for and at law enforcement agencies. 

     

    COURSE TITLEACADEMIC UNIT
    Foundations of Cybersecurity
    1
    Basic Cybersecurity Risk Management1
    Intermediate Cybersecurity Risk Management1
    Payment Flows
    1
    Cyber Fraud Loss Cycle
    1
    Mastercard Cybersecurity Tools1
    Cybercriminal Profiling 1
    Enterprise Cyber Risk Management 1
    Insider Threat1
    Corporate Security Structure1
    Public-Private Sector Partnerships1
    Intelligence Life Cycle1
    Introduction to Cryptography1
    Hardware Trojan Threats and Countermeasures 1
    Hardware Security and Design for Trust1


      Listed courses are:

      • Credit-bearing and stackable to Graduate Certificate in Cybersecurity and Digital Trust (total 9 AUs) and FlexiMasters in Cybersecurity and Digital Trust (15 AUs)

      Learners are encouraged to complete the following core courses before enrolling in the remaining courses:

      1. Foundations of Cybersecurity (1 AU)
      2. Basic Cybersecurity Risk Management (1 AU)
      3. Intermediate Cybersecurity Risk Management (1 AU)