The main objective of the program is to strengthen and expand the understanding of graduates in computer science, telecommunications, and electronics of the fundamental concepts involving data protection. In addition, the program focuses on providing updated training on the theoretical framework and applied tools required in data processing and transmission.

Specific Objectives:

  • To provide theoretical and applied tools in cryptography and computer security – in particular those related to information systems and networks.
  • To gain proficiency in the techniques and protocols commonly used to assure a safe and reliable transmission of data, and a controlled access in shared use technologies.
  • To master the skills required in the application of the prevailing algorithms used to code data in reliable and efficient transmissions.
  • To acquire familiarity with the most commonly used algorithms and systems of authentication, protection, and privacy – as well as widespread data breach tactics.
  • To update knowledge and skills on new technical and methodological views, along with theoretical theoretical frameworks, in computer security.
  • To explore current trends in the fundamental paradigms of computer systems and networks.
  • To outline the strain between the demands for efficiency in computer systems and the requirements for adequate costs.
  • To integrate theory and practice by applying specific skills in professional work.
  • To foster the analysis, through multiple levels, of formal cryptographic models: their different logical frameworks and their encryption algorithms.
  • To integrate theory and applications in order to assess adequately cost and feasibility in secure network systems.



To hone the skills in the implementation of high complexity projects in the field of cryptography and computer security.

The creation of the graduate program in cryptography and computer security falls within a process of expansion of the academic goals in the area of graduate studies of the Technical School of Higher Education (Escuela Superior Técnica), constituent of the Institute of Higher Education of the Army (Instituto de Enseñanza Superior del Ejército)|

It comprises an educational opportunity of great significance because it offers graduate candidates of related fields – such as computer science, electronics, telecommunications, and information systems – the opportunity to enhance their knowledge on new technological breakthroughs and maintain an updated grasp on the developments and applications of their profession.

Information security and its related disciplines – one of which is cryptography – are subject to a complicated and turbulent backdrop in the international arena, to rapid changes, and to an increase in risks and threats on civil institutions, with specific focus on attacks to computer systems and networks.

On the same hand, the relevance of these attacks are ever more conspicuous by the rapid spread of viruses, intrusions to highly protected national networks, banks, institutions, among other organizations of no lesser importance. The conflict, which is no longer a threat but a daily reality, needs to be addressed at the core of the National Defense debate, as it constitutes an example of asymmetric threat.

Currently, data processing is necessarily followed by the transmission of information to local or remote sites. These new areas of study respond to the requirements and needs of everyday life. Although their focus aims to the technological field, they require a consistent grasp of mathematical models.

Specific aspects of applied mathematics are required, as they constitute the basis of the languages used in its methodology for development (algorithm construction, use of abstraction, and deductive logic in the construction of theorems).

One of the most effective tools to provide technological solutions to the diverse security problems at any level involves the use of cryptographic techniques, ciphering, and encryption. Their use and application require skills associated with mathematics, and secondly, with the technological advances of cryptographic systems.