This paper summarizes and classifies the teaching contents of technology of applied cryptogram course according to the knowledge points. At the same time, the ideological and political elements of the course are designed from the following perspectives; (1) Abiding laws and regulations, and using cryptographic technology for the protection of network security; (2) Enabling students to firmly establish the belief that “core technology should be independent, and China’s science and technology should be self-improvement.” Further, the ideology and political elements are integrated into different teaching contents according to the knowledge points around these two themes. This course balances the relationship among ideology and morality, knowledge ability and quality. It not only focuses on improving students’ learning interest and ability, but also cultivates students to establish the correct outlook on life and values. The practical application shows that the overall effect is good.
Yan G, 2021, Application of Information Encryption Technology in Computer Network Security. International Journal of Computational and Engineering, 6(4): 126-128.
Yi Z, Jianhua F, Xiaoxin C, et al., 2021, Machine Learning Aided Key-Guessing Attack Paradigm Against Logic Block Encryption. Journal of Computer Science and Technology, 36(5): 1102-1117. https://org.doi/10.1007/S11390-021-0846-6
Aghili SF, Sedaghat M, Singelee D, et al., 2022, MLS-ABAC: Efficient Multi-Level Security Attribute-Based Access Control scheme. Future Generation Computer Systems, 131: 75-90. https://org.doi/10.1016/J.FUTURE.2022.01.003
Xin Z, Xiaoling, 2022, Thoughts on Vulnerability Security by Ransomware Virus. International Journal of Social Science and Education Research, 5(1): 120-124. https://doi.org/10.6918/ IJOSSER.202201_5(1).0019
El AS, Lozi R, Puech W, 2022, Special Issue on Cryptography and its Applications in Information Security. Applied Sciences, 12(5): 2588-2591. https://org.doi/10.3390/APP12052588
Galdi C, Kolesnikov V, 2022, Special issue: Security and Cryptography for Networks-SCN 2020. Journal of Computer Security, 30(1): 1-2. https://org.doi/10.3233/JCS-219000
Guru A, Ambhikar A, Cardenas AA, et al., 2021, A Study of Cryptography to Protect Data from Cyber-crimes. Research Journal of Engineering and Technology, 11(2): 45-48.
Yijun Y, Fei C, Zhiwei S, et al., 2019, Secure and Efficient Parallel Hash Function Construction and Its Application on Cloud audit. Soft Computing, 23(18): 8907-8925. https://org.doi/10.1007/s00500-018-3489-y
Yousef AH, Mohamed FI, 2019, Reducing Hash Function Complexity: MD5 and SHA-1 as Examples. International Journal of Mathematical Sciences and Computing, 5(1): 1-17.
Yuan Q, Tibouchi M, Abe M, 2022, On Subset-Resilient Hash Function Families. Designs, Codes, and Cryptography, 2022(90): 719-758. https://org.doi/10.1007/s10623-022-01008-4