Cryptography
Cryptography
L- Lectures; T- Tutorial/Teacher Guided Student Activity; P- Practical; Cr- Credit; *C.E – Continuous Evaluation
(Presentation, Assignment, Progressive assessment etc.)
Contents:
Sr. Topic Teaching
Weightage
No. Hrs.
Introduction:
1. Computer Security Concept, The OSI Security Architecture, Security Attacks, 5 3
Security Services, Security Mechanism, A Model for Network Security
Classical Encryption Techniques ::
2. Symmetric Cipher Model, Substitution Techniques, Transposition Techniques, 10 6
Steganography
Block Ciphers and the Data Encryption Standard::
3 Block Cipher Principles, Data Encryption Standard (DES), Deferential and Linear 15 8
Cryptanalysis, Block Cipher Design Principles, Block Cipher Operation, RC4
Number theory and Advance Encryption Standard:
The Euclidean Algorithm, Modular Arithmetic, Groups, Rings, and Fields, Finite
4. 15 8
Fields of the Form GF(p), Polynomial Arithmetic, Advance Encryption
Standard(AES): structure, key expansion
Asymmetric Ciphers:
5. Prime Numbers, Fermat’s and Euler’s Theorems, Testing for Primality Principles 15 6
of Public-Key Cryptosystems, The RSA Algorithm, DiffieHellman Key Exchange
Cryptographic Data Integrity Algorithms:
Hash Function: Hash Function and its Application, Security Requirements for
Cryptographic Hash Functions, Hash Functions Based on Cipher Block Chaining,
Secure Hash Algorithm (SHA),
6. 15 8
Message Authentication code: Message Authentication Requirements,
Message Authentication Functions, Requirements for Message Authentication
Codes, Security of MACs, HMAC,
Digital Signature: Introduction to Digital Signatures, Digital Signature Standard
Key Management and Distribution:
Symmetric Key Distribution: Symmetric Key Distribution Using Symmetric
7. 15 6
Encryption, Symmetric Key Distribution Using Asymmetric Encryption,
Asymmetric Key Distribution: Distribution of Public Keys, X.509 certificates.
Sr. Topic Teaching
Weightage
No. Hrs.
Pseudorandom numbers: Principles of Pseudorandom Number Generation,
Pseudorandom Number Generators, Pseudorandom Number Generation Using
a Block Cipher
User Authentication:
Remote User-Authentication Principles, Remote User-Authentication Using
10 4
Symmetric Encryption, Kerberos, Remote User-Authentication Using
Asymmetric Encryption
Reference Books:
1. Cryptography And Network Security, Principles And Practice (TextBook) William Stallings; Pearson
2. Cryptography & Network Security Behrouz A. Forouzan; Tata McGraw-Hill
3. Information Security Principles and Practice Deven Shah,; Wiley-India
4. Information Security Principles and Practice Mark Stamp; Wiley IndiaEdition
Course Outcome:
After learning the course the students should be able to:
1. Define the concepts of Information security and their use
2. Describe the principles of symmetric and asymmetric cryptography.
3. Apply the concepts of hashing algorithms
4. Understand and use the various key management and remote authentication mechanisms.