0% found this document useful (0 votes)
7 views

TOPICS Not Present

Uploaded by

chaitanya252533
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

TOPICS Not Present

Uploaded by

chaitanya252533
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Unit 1

Mathematics of Cryptography:
https://www.researchgate.net/publication/
373272054_Mathematics_for_Cryptography_A_Guide_to_Mathematical_Fundamentals_of_Differen
t_Classes_of_Cryptography_Algorithms

Cryptography:

Cryptography, a word with Greek origins, means “secret writing.”

However, we use the term to refer to the science and art of transforming messages to make them
secure and immune to attacks.

Although in the past cryptography referred only to the encryption and decryption of messages using
secret keys, today it is defined as involving three distinct mechanisms:

1)symmetric-key encipherment,

2)asymmetric-key encipherment,

3)and hashing

Differentiate between symmetric and asymmetric encryption:

https://www.geeksforgeeks.org/difference-between-symmetric-and-asymmetric-key-encryption/

Cryptography is the practice of securing communication and protecting sensitive data, and
understanding the mathematical concepts behind these algorithms is crucial for working with them
effectively.

Each class of cryptography algorithms is associated with specific mathematical areas that are
essential to be familiar with.

Difference between cryptography and cryptology:

https://www.geeksforgeeks.org/difference-between-cryptography-and-cryptology/

Explain various types of cryptanalytic attacks and cryptanalysis and cryptology.

https://www.geeksforgeeks.org/cryptanalysis-and-types-of-attacks/

Define plain text, cipher text, enciphering, deciphering with an example

https://www.tutorialspoint.com/what-are-the-basic-terms-used-in-cryptography-in-information-
security

https://www.encryptionconsulting.com/education-center/what-are-plaintext-and-ciphertext/
Network security:

https://www.slideshare.net/slideshow/network-security-modelpptx/256555933

Describe the model for network security with a neat sketch.

https://binaryterms.com/network-security-model.html

Unit 2:
Symmetric cipher:
Explain in detail about Symmetric Cipher Model.

Explain about the essential ingredients of symmetric cipher

https://www.geeksforgeeks.org/symmetric-cipher-model/

block cipher and stream cipher:


List and explain block cipher modes of operation

https://www.geeksforgeeks.org/block-cipher-modes-of-operation/

Compare and contrast between stream cipher with block cipher

https://www.geeksforgeeks.org/difference-between-block-cipher-and-stream-cipher/

Data Encryption Standard (DES):


Explain DES and different modes of operation in DES state its advantages and disadvantages.

https://www.coursera.org/in/articles/data-encryption-standard

Full DES:

https://www.simplilearn.com/what-is-des-article#:~:text=DES%20uses%2016%20rounds
%20of,different%20key%20for%20each%20round.

There are multiple steps involved in the steps for data encryption. They are:

1. Permutate the 64-bits in the plain text and divide them into two equal halves.

2. These 32-bit chunks of data will undergo multiple rounds of operations.


3. Apply XOR operation in between expanded right plain text and the compressed
key of 48-bit size.

4. The resultant output is sent to the further step known as S-box substitution.

5. Now apply the XOR function to the output and the left plain text and store it in the
right plain text.

6. Store the initial right plain text in the left plain text.

7. Both the LPT and RPT halves are forwarded to the next rounds for further
operations.

8. At the end of the last round, swap the data in the LPT and RPT.

9. In the last step, apply the inverse permutation step to get the cipher text

Public key encryption:


https://www.geeksforgeeks.org/public-key-encryption/

difference between symmetric key cryptography and public key cryptography is same as diff between
symmetric key cryptography and asymmetric key cryptography

RC4 algorithm:

https://www.geeksforgeeks.org/rc4-encryption-algorithm/

RC5 algorithm:

https://www.geeksforgeeks.org/rc5-encryption-algorithm/

You might also like