Encryption and Authentication: Not Only for Spies

This is an exercise-based course that explores the concepts and methods necessary for successful encryption and decryption of various types of content, and also the successful authentication of different users to different types of systems. Modify as necessary...

  • Course Objectives

To provide an introduction to encryption and [identity] authentication, identify their benefits and drawbacks, provide examples of current use, and how they might develop in the future.

  • Audience

Nerds, people paranoid about secrecy and privacy, most government departments.

  • Prerequisites

An interest in geeky things. A certain level of paranoia is a benefit but not required.

Identity Authentication

  • Explain what it is and why it might be important.
  • Maybe explain the difference between authentication and authorization.

Pros and Cons of Authentication

  • Are you really you?
  • What happens if somebody steals "you" - Identity Theft
  • Use your imagination and add a topic or two.

Quiz

  • Questions here
  • At least one quiz question each
  • No more than two multiple-choice questions

Different Methods of Authentication

  • Multi-factor Auth
  • Bio-auth
  • Think of something futuristic?

GE: Setting up Multi-factor Auth

Leave this blank. The authors can fill it in from start to finish.

An Introduction to Encryption

  • Explain what encryption is, assuming most people know nothing.
  • Explain what it is not, just to set some boundaries.
  • Discuss and dispel some myths about encryption.
  • Discuss strong versus weak encryption.
  • Add another topic here.

Quiz

  • At least four good questions.
  • At least one question per writer.
  • No more than two multi-choice.

Pros and Cons of Encryption

  • Some things are good.
  • Maybe some things are not so good.
  • Try not to get too political.

Quiz

  • At least four good questions.
  • At least one question per writer.
  • No more than two multi-choice.

Examples of Encryption in Everyday Life

  • Use your imagination.
  • Find at least three dissimilar examples.
  • Make sure you include something you can use in a GE.

Quiz

  • At least four good questions.
  • At least one question per writer.
  • No more than two multi-choice.

The Future of Encryption

(do we need this?)

Where will we be in 5, 10, 20 years? Where were we 5, 10, 20 years ago, just for comparison?

GE: Configuring|Setting up $encryption-type

  • Leave this blank. The authors should do this from start to finish.

Playpen

  • List some auth models

  • Describe simple and complex auth

  • List some different types of encryption

  • Do some examples of encrypting and decrypting

  • Demonstrate two encryption tools

  • Hacking and cracking: Can people get around encryption?