MTechCryptology 1
MTechCryptology 1
Pool B
Semester 2
2. Cryptology
Semester 3
1. Advanced Cryptology
1
4. Elective 1
5. Elective 2
Semester 4
2. Topics in Privacy
3. Topics in Security
4. Topics in Cryptology
Detailed Syllabus
Discrete Mathematics
1. Combinatorics: Sets, Diagonalization and the Pigeonhole Principle, Multinomial the-
orem, principle of inclusion exclusion; Recurrence relations - classification, summa-
tion method, extension to asymptotic solutions from solutions for subsequences; Lin-
ear homogeneous relations, characteristic root method, general solution for distinct
and repeated roots, non-homogeneous relations and examples, generating functions
and their application to linear homogeneous recurrence relations, non-linear recur-
rence relations, exponential generating functions, brief introduction to Polya theory
of counting.
References:
1. Sipser: Introduction to The Theory of Computation, PWS Pub. Co., New York, 1999.
2. Operating Systems:
4. Vector spaces: subspaces, linear independence, basis, dimension, direct sum and com-
plement, isomorphism
5. Linear transformation and matrices, algebra of matrices, rank and inverse, normal
forms
References:
3. L. L. Domhoff and F. E. Hohn: Applied Modem Algebra, Macmillan, New York, 1978.
6. G. Birkhoff and S. McLane: A Survey of Modem Algebra, 4th ed. Macmillan, New
York, 1977.
7. D. Burton: Elementary Number Theory, 7th ed., McGraw Hill Education, 2017.
2. Statistics
References:
References:
1. L. Nyhoff, C++ An Introduction to Data Structures, Prentice Hall, Englewood Cliffs,
1998.
5. E. Horowitz and S. Sahni: Fundamentals of Data Structures, CBS, New Delhi, 1977.
6. R. L. Kruse: Data Structures and Program Design in C, Prentice Hall of India, New
Delhi, 1996.
9. P. E. Livadas: File Structure: Theory and Practice, Prentice Hall, New Jersey, 1990.
11. S. Sahani: Data Structure, Algorithms and Applications in JAVA, McGraw Hill, New
York, 2000.
12. Wood: Data Structure, Algorithms and Performance, Addison-Wesley, Reading, Mass.,
1993.
15. B. W. Kernighan and R. Pike: The Unix Programming Environment, Prentice Hall
of India, 1996.
6. Graph algorithms.
7. NP-completeness.
References:
2. A. Aho, J. Hopcroft and J. Ullman; The Design and Analysis of Computer Algorithms,
A. W. L, International Student Edition, Singapore, 1998
8. D. E. Knuth: The Art of Computer Programming, Vol. 1, Vol. 2 and Vol. 3. Vol. 1,
2nd ed., Narosa/Addison-Wesley, New Delhi/London, 1973; Vol. 2: 2nd ed., Addison-
Wesley, London, 1981; Vol. 3: Addison-Wesley, London, 1973.
Cryptology
1. Classical ciphers
3. Stream ciphers
4. Block ciphers
6. Formal models for block and stream ciphers: Pseudorandom generators, Pseudoran-
dom functions and permutations
7. Symmetric key encryption: Notion of CPA and CCA security with examples.
References:
2. Douglas R. Stinson: Cryptography Theory and Practice, 3rd ed., Chapman & Hall/CRC,
2006.
3. Dan Boneh, Victor Shoup: A Graduate Course in Applied Cryptography, online draft
available at http://toc.cryptobook.us/.
2. Coding Theory:
9. V. Pless: Introduction to the Theory of Error Correcting Codes, 3rd ed., John Wiley,
New York, 1982.
References:
References:
1. Ross Anderson: Security Engineering, 2nd ed., Wiley. Available online: http://www.
cl.cam.ac.uk/~rja14/book.html.
2. C.P. Pfleeger, S.L. Pfleeger, J. Margulies: Security in Computing, 5th ed., Prentice
Hall, 2015.
3. David Wheeler: Secure Programming HOWTO. Available online: https://www.
dwheeler.com/secure-programs/.
4. Michal Zalewski: Browser Security Handbook, Michael Zalewski, Google. Available
online: https://code.google.com/archive/p/browsersec/wikis/Main.wiki.
5. B. S. Schneier: Applied Cryptography: Protocols, Algorithms, and Source Code in C,
2nd Edition, John Wiley and Sons, New York, 1995.
6. A. Menezes, P. C. Van Oorschot and S. A. Vanstone: Handbook of Applied Cryptog-
raphy, CRC Press, Boca Raton, 1996.
Advanced Cryptology
1. Theoretical construction of pseudorandom objects: One way functions, pseudorandom
generators, pseudorandom functions and pseudorandom permutations.
2. Secure Multiparty Computations.
3. Elliptic curves and bilinear pairings.
4. Lattice Based Cryptology.
References:
1. Oded Goldreich: Foundations of Cryptography Vol 1
2. Oded Goldreich: Foundations of Cryptography Vol 2
3. Dan Boneh, Victor Shoup: A Graduate Course in Applied Cryptography, online draft
available at http://toc.cryptobook.us/.
4. Steven D. Galbraith: Mathematics of Public Key Cryptography, Cambridge Univer-
sity Press, 2012
5. Rafael Pass and Abi Shelat: A Course in Cryptography, Lecture notes. Available
online: https://www.cs.cornell.edu/courses/cs4830/2010fa/lecnotes.pdf
6. Daniele Micciancio, Shafi Goldwasser, Complexity of Lattice Problems: A Crypto-
graphic Perspective, Kluwer, 2002.
7. Lawrence C. Washington, Elliptic Curves: Number Theory and Cryptography, Second
Edition, CRC Press 2008.
8. S. Chatterjee, P. Sarkar: Identity-Based Encryption, Springer, 2011.
Computing Systems Security II
1. Cellular networks, Access Technologies, GSM, CDMA, GPRS, 3G networks, Wireless
LAN, WLAN security.
3. Database Security:
References:
1. Ross Anderson: Security Engineering, 2nd ed., Wiley. Available online: http://www.
cl.cam.ac.uk/~rja14/book.html.
2. C.P. Pfleeger, S.L. Pfleeger, J. Margulies: Security in Computing, 5th ed., Prentice
Hall, 2015.
1. Cryptographic Implementations:
2. Security Implementations:
References:
3. Quantum Entanglement.
4. Quantum Teleportation.
5. Super-dense coding.
7. Quantum search.
8. Shor’s factoring algorithm and its implication towards security in quantum world.
References:
Topics in Privacy
1. Review of cryptographic protocols: Homomorphic Encryption, group signatures, blind
signatures, anonymous credential management, commitment schemes, zero-knowledge
proofs, proof of knowledge, ZK-SNARK, oblivious transfer, secure multiparty compu-
tation, Oblivious RAM, private set intersections, private information retrieval.
3. Differential privacy
4. De-anonymization techniques
6. Applications: Mixnets, Onion Routing (TOR), e-cash, e-voting, location privacy, pro-
filing
References:
3. Rafael Pas and abi shelat, A Course in Cryptography, Lecture notes. Available online:
https://www.cs.cornell.edu/courses/cs4830/2010fa/lecnotes.pdf
Topics in Security
Topics related to contemporary and emerging areas in security would be discussed.:
1. Digital Forensics
3. Biometrics
References:
1. Gerard Johansen: Digital Forensics and Incident Response, Packt Publishing Limited
2017
Topics in Cryptology
In depth study in some contemporary and emerging areas in cryptology. The list will be
updated from time to time. Topics may include but not limited to
4. Homomorphic Encryption
5. Cloud Cryptology
6. Authenticated encryption
References:
3. Dan Boneh, Victor Shoup: A Graduate Course in Applied Cryptography, online draft
available at http://toc.cryptobook.us/.
7. Finding generators and discrete log in Zp∗ . Diffie-Hellman key exchange. Testing
quadratic residuosity. Computing modular square root. Quadratic residuposity as-
sumption.
References:
1. Victor Shoup: A Computational Introduction to Number Theory and Algebra, Cam-
bridge University Press
2. Unsupervised learning
References:
3. Trevor Hastie, Robert Tibshirani: The Elements of Statistical Learning: Data Mining,
Inference, and Prediction, Springer, 2009.
5. Smart contracts
6. Privacy issues: Anonymity, mixing techniques, privacy with ZK-Snarks.
References:
3. Web Resources.
5. Indian Cyber Law: (i) Information Technology Law in India (ii) Selected Cyber Law
Cases (iii) Selected Adjudicating Officer Orders (iv) Data Privacy Law in India (v) IT
Act Audit & Compliance (vi) Documentation Issues (vii) International Cyber Crime
Law (viii) Emerging Issues in Cyber Law.
7. Copyright management
9. Electronic voting.
References:
1. Ross Anderson: Security Engineering, 2nd ed., Wiley. Available online: http://www.
cl.cam.ac.uk/~rja14/book.html.
4. Helen Nissenbaum: Privacy in Context: Technology, Policy, and the Integrity of Social
Life, Stanford University Press, 2009.