Proceedings of the 2nd Annual Conference on Information Security Curriculum Development 2005
DOI: 10.1145/1107622.1107625
|View full text |Cite
|
Sign up to set email alerts
|

A proposed curriculum of cryptography courses

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2007
2007
2024
2024

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…-It encourages students to represent situations by simulating certain models, provides them with practical experience to practice their communication skills, provides them with opportunities to practice speaking skills, and stimulates in them the desire to express themselves (Harmar, 2007). -Adding to the atmosphere of pleasure, and alleviating the feeling of boredom and routine, which encourages them to show their personality inside the classroom (Al-Hamdani, 2002). The positive results of the speaking skill (individually) can be attributed to: -The superiority of the experimental group's female students in intellectual skills is due to the fact that the simulation activities worked to organize the experimental group's ideas.…”
Section: Meansmentioning
confidence: 99%
“…-It encourages students to represent situations by simulating certain models, provides them with practical experience to practice their communication skills, provides them with opportunities to practice speaking skills, and stimulates in them the desire to express themselves (Harmar, 2007). -Adding to the atmosphere of pleasure, and alleviating the feeling of boredom and routine, which encourages them to show their personality inside the classroom (Al-Hamdani, 2002). The positive results of the speaking skill (individually) can be attributed to: -The superiority of the experimental group's female students in intellectual skills is due to the fact that the simulation activities worked to organize the experimental group's ideas.…”
Section: Meansmentioning
confidence: 99%
“…A good cryptography curriculum is presented in [1], which covers: Mathematics: integer factorization problem, RSA problem, quadratic residuosity problem, computing square roots in Zn, discrete logarithm, Diffie-Hellman problem, composite mod, computing individual bits, Tsubset sum problem, factoring polynomials over finite fields, probabilistic primality tests, (True) Primality tests, prime number generation, irreducible polynomials over Zp, generators and elements of high order, cryptographically secure pseudorandom bit generation …”
Section: Cryptography Curriculummentioning
confidence: 99%
“…A normal cryptography course consists of the following different topics: "classical algorithms, block cipher, stream cipher (some curriculum ignore this part), digital signature, hash function, authentication and key managements" [1] Some curriculums also add a mathematical background to cover some aspects of the number theory, while others leave this to another course as a prerequisite. Whatever the case, the main issue in presenting the cryptography curriculum to the type of student backgrounds and their track major, the question is, "Do we present the same curriculum in the same way to all four types of student backgrounds (mathematics, computer science, and information security)?"…”
Section: Introductionmentioning
confidence: 99%
“…Al-Hamdani et al suggest protection and response strategies, and designing efficient detec-that approximately 100 hours of cryptography is sufficient in an tion and security systems. DSU has added CIS 245: Principles undergraduate security program [19]. Therefore, DSU revised in Information Security course consistent with what Whitman the curriculum to include 100 hours of cryptography content and Mattord recommended in 2004.…”
Section: Introductionmentioning
confidence: 99%