0% found this document useful (0 votes)
31 views2 pages

Cryptography

This document outlines the syllabus for a Cryptography course offered in the 6th semester of the B.Tech program at Parul University's Faculty of Engineering & Technology, Department of Computer Science & Engineering. The course provides an introduction to fundamental cryptography principles and applications in information security, covering topics like symmetric and asymmetric encryption, hashing, digital signatures, and key distribution. It will be taught over the semester with 3 lecture hours and no tutorial or practical hours per week, earning students 3 credits upon successful completion, as assessed through both internal and external exams. The syllabus lists 7 main topics to be covered, along with the teaching hours allotted to each. Upon completing the course, students should be able to define information security concepts
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views2 pages

Cryptography

This document outlines the syllabus for a Cryptography course offered in the 6th semester of the B.Tech program at Parul University's Faculty of Engineering & Technology, Department of Computer Science & Engineering. The course provides an introduction to fundamental cryptography principles and applications in information security, covering topics like symmetric and asymmetric encryption, hashing, digital signatures, and key distribution. It will be taught over the semester with 3 lecture hours and no tutorial or practical hours per week, earning students 3 credits upon successful completion, as assessed through both internal and external exams. The syllabus lists 7 main topics to be covered, along with the teaching hours allotted to each. Upon completing the course, students should be able to define information security concepts
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

PARUL UNIVERSITY - FACULTY OF ENGINEERING & TECHNOLOGY

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


SYLLABUS (PROPOSED) FOR 6th SEM B. TECH. PROGRAMME
CRYPTOGRAPHY (SUBJECT CODE: 203105381)

Type of Course: B.Tech.


Prerequisite: Students should be familiar with basic concepts of computer networks and Mathematics including
modular arithmetic
Rationale: This course provides an introduction to the fundamental principles of cryptography and its applications
on the information security domain. This subject covers various important topics concern to information security
like symmetric and asymmetric cryptography, hashing, message and user authentication, digital signatures, key
distribution.

Teaching and Examination Scheme:


Teaching Scheme Examination Scheme
(Hrs/Week)
Cr Total
External Internal
L T P
Theory Practical Theory *C.E. Practical
3 0 0 3 60 - 20 20 - 100

L- Lectures; T- Tutorial/Teacher Guided Student Activity; P- Practical; Cr- Credit; *C.E – Continuous Evaluation
(Presentation, Assignment, Progressive assessment etc.)

Contents:
Sr. Topic Teaching
Weightage
No. Hrs.
Introduction:
1. Computer Security Concept, The OSI Security Architecture, Security Attacks, 5 3
Security Services, Security Mechanism, A Model for Network Security
Classical Encryption Techniques ::
2. Symmetric Cipher Model, Substitution Techniques, Transposition Techniques, 10 6
Steganography
Block Ciphers and the Data Encryption Standard::
3 Block Cipher Principles, Data Encryption Standard (DES), Deferential and Linear 15 8
Cryptanalysis, Block Cipher Design Principles, Block Cipher Operation, RC4
Number theory and Advance Encryption Standard:
The Euclidean Algorithm, Modular Arithmetic, Groups, Rings, and Fields, Finite
4. 15 8
Fields of the Form GF(p), Polynomial Arithmetic, Advance Encryption
Standard(AES): structure, key expansion
Asymmetric Ciphers:
5. Prime Numbers, Fermat’s and Euler’s Theorems, Testing for Primality Principles 15 6
of Public-Key Cryptosystems, The RSA Algorithm, DiffieHellman Key Exchange
Cryptographic Data Integrity Algorithms:
Hash Function: Hash Function and its Application, Security Requirements for
Cryptographic Hash Functions, Hash Functions Based on Cipher Block Chaining,
Secure Hash Algorithm (SHA),
6. 15 8
Message Authentication code: Message Authentication Requirements,
Message Authentication Functions, Requirements for Message Authentication
Codes, Security of MACs, HMAC,
Digital Signature: Introduction to Digital Signatures, Digital Signature Standard
Key Management and Distribution:
Symmetric Key Distribution: Symmetric Key Distribution Using Symmetric
7. 15 6
Encryption, Symmetric Key Distribution Using Asymmetric Encryption,
Asymmetric Key Distribution: Distribution of Public Keys, X.509 certificates.
Sr. Topic Teaching
Weightage
No. Hrs.
Pseudorandom numbers: Principles of Pseudorandom Number Generation,
Pseudorandom Number Generators, Pseudorandom Number Generation Using
a Block Cipher
User Authentication:
Remote User-Authentication Principles, Remote User-Authentication Using
10 4
Symmetric Encryption, Kerberos, Remote User-Authentication Using
Asymmetric Encryption

Reference Books:
1. Cryptography And Network Security, Principles And Practice (TextBook) William Stallings; Pearson
2. Cryptography & Network Security Behrouz A. Forouzan; Tata McGraw-Hill
3. Information Security Principles and Practice Deven Shah,; Wiley-India
4. Information Security Principles and Practice Mark Stamp; Wiley IndiaEdition

Course Outcome:
After learning the course the students should be able to:
1. Define the concepts of Information security and their use
2. Describe the principles of symmetric and asymmetric cryptography.
3. Apply the concepts of hashing algorithms
4. Understand and use the various key management and remote authentication mechanisms.

You might also like