This document provides a syllabus for a B.Tech course in Cryptography and Network Security. It outlines 5 units that will be covered:
1. Introduction to security attacks and cryptography fundamentals like conventional encryption techniques, modern block ciphers, and key distribution.
2. Number theory concepts like prime numbers, modular arithmetic, and public key cryptography algorithms like RSA, Diffie-Hellman, and elliptic curve cryptography.
3. Message authentication and hash functions including MACs, MD5, SHA, and digital signatures.
4. Authentication applications like Kerberos, X.509, PGP, and S/MIME.
5. IP security architecture, authentication headers, encapsulating security
This document provides a syllabus for a B.Tech course in Cryptography and Network Security. It outlines 5 units that will be covered:
1. Introduction to security attacks and cryptography fundamentals like conventional encryption techniques, modern block ciphers, and key distribution.
2. Number theory concepts like prime numbers, modular arithmetic, and public key cryptography algorithms like RSA, Diffie-Hellman, and elliptic curve cryptography.
3. Message authentication and hash functions including MACs, MD5, SHA, and digital signatures.
4. Authentication applications like Kerberos, X.509, PGP, and S/MIME.
5. IP security architecture, authentication headers, encapsulating security
UNIT-1 Introduction to security attacks, services and mechanism, introduction to
cryptography , Conventional Encryption: Conventional encryption model , classical encryption techniques substitution ciphers and transposition ciphers , cryptanalysis, stereography, stream and block ciphers , Modern Block Ciphers: Block ciphers principals, Shannon¶s theory of confusion and diffusion, fiestal structure , data encryption standard(DES), strength of DES , differential and linear crypt analysis of DES, block cipher modes of operations, triple DES , IDEA encryption and decryption , confidentiality using conventional encryption, traffic confidentiality , key distribution, random number generation UNIT-2 Introduction to graph, ring and field, prime and relative prime numbers , modular arithmetic, Fermat¶s and Euler¶s theorem , primality testing, Euclid¶s Algorithm, Chinese Remainder theorem , discrete logarithms. Principals of public key crypto systems , RSA algorithm, security of RSA , key management, Diffie-Hellman key exchange algorithm , introductory idea of Elliptic curve cryptography, Elganel encryption. UNIT-3 Message Message Authentication and Hash Function , Authentication requirements, Authentication and Hash authentication functions, message authentication code , hash functions, Function: birthday attacks , security of hash functions and MACS, MD5 message digest algorithm , Secure hash algorithm(SHA) , Digital Signatures: Digital Signatures, authentication protocols , digital signature standards (DSS), proof of digital signature algorithm. UNIT-4 Authentication Authentication Applications: Kerberos and X.509 , directory authentication Applications: service , electronic mail security-pretty good privacy (PGP) , S/MIME UNIT-5 IP Security: IP Security: Architecture , Authentication header, Encapsulating security payloads , combining security associations , key management Web Security: Secure socket layer and transport layer security , secure electronic transaction (SET) , System Security: Intruders, Viruses and related threads , firewall design principals , trusted systems
Nomenclatura - Encyclopedia of modern Cryptography and Internet Security: From AutoCrypt and Exponential Encryption to Zero-Knowledge-Proof Keys [Paperback]