The student must recognize the current importance of information concealment techniques, in particular cryptography and steganography, as well as the technologies that allow their treatment, their weaknesses and the threats they face. In order to achieve these objectives, the student must acquire a range of knowledge, skills and attitudes as detailed below.
At the end of the course, the student should be able to:
- Know the classic cryptographic and steganographic systems and the reasons for their insecurity.
- Know the mathematical foundations of modern cryptography and steganography, as well as the techniques to analyze their security: cryptanalysis and steganography, respectively.
- Master the main cryptosystems and the current encryption algorithms.
- Know the signature and verification systems based on public key
- Know the problems associated with password management and its various solutions.
As regards capacities, they can be broken down into specific and generic (skills).
Concerning specific skills, the learner will be able to
- Solve problems of number theory in its application to cryptography. (P.O.: a)
- Recognize the advantages, disadvantages and uses of secret and public-key systems. (P.O.: a, c)
- Sign and verify in different environments, detecting possible attacks (P.O.: a, c)
- Identify methods for hiding information in different media (P.O.: a, c)
As for the general capacities or skills, during the course they will be worked on:
- The ability to find and select relevant information to solve a specific problem. (P.O.: a, b)
- The ability to apply multidisciplinary knowledge to the resolution of a given problem. (P.O.: a, c, e, g)
- The ability to investigate a particular cryptosystem or steganosystem in a given environment and find its vulnerabilities and threats. (P.O.: a, b)
As far as attitudes are concerned, the student after taking the course should have
- A critical attitude towards the security offered by particular encryption or information concealment system, in a given environment and given risks. (P.O.: i)
- A suspicious attitude towards the security supposed by the information hiding systems implemented in the systems. (P.O.: i)