CSE2221 - Cryptography Handout Updated
CSE2221 - Cryptography Handout Updated
A. Basic Details:
Programme Name: Bachelor of Technology
Course Name: Cryptography
Course Code: CSE2221
LTPC (Lecture Tutorial Practical
3104
Credits):
Session: January – May, 2025
Class: Semester – IV
Course Coordinator: Prof. (Dr.) Umashankar Rawat
Dr. Satyabrata Roy, Dr. Aditya Sinha, Dr.
Course Instructor(s):
Ankur Pandey, Dr. Juhi Singh, Dr. Pallavi
Additional Practitioner(s) – if any
(Industry Fellow/ Visiting Faculty/ Adjunct To be identified and appointed later
Faculty, etc.):
Target Target
CO Statement CO Level Attainment Attainment
% level
Illustrate the fundamentals of 2
1 ≥ 80 3
cryptography (Understand)
Solve problems using mathematical 3
concepts in cryptographic 2 ≥ 70% < 80% 2
(Apply)
techniques
Demonstrate the use of symmetric 2
encryption algorithms such as DES, 3 ≥ 80 3
(Understand)
AES, and their modes of operation
Utilize public-key techniques such
as RSA, Diffie-Hellman, and Elliptic 3
4 ≥ 80 3
Curve Cryptography for secure key (Apply)
exchange and encryption
Demonstrate secure communication 2
5 ≥ 70% < 80% 2
and authentication techniques (Understand)
[PSO.1] Will be able to design, develop and implement efficient software for a
given real-life problem.
[PSO.2] Will be able to apply knowledge of AI, Machine Learning and Data Mining
in analyzing big data for extracting useful information from it and for
performing predictive analysis.
[PSO.3] Will be able to design, manage and secure wired/ wireless computer
networks for transfer and sharing of information.
E. Assessment Plan:
F. Syllabus:
Textbooks
1. B. A. Forouzan, D. Mukhopadhyay, “Cryptography and Network Security”, McGraw
Hill, 3rd Edition, 2008.
2. W. Stallings, “Cryptography and Network Security: Principles and Practice”,
Prentice Hall, 5th edition, 2010.
G. Lecture Plan:
Mode of
Lect. Mode of
Topics Session Outcome CO Assessing
No. delivery CO
Describe the
Introduction to Security objectives of MTE, CWS,
1. 1 Goals, Attacks, Services 1 Lecture
cryptography and its ETE
and Mechanisms types.
Apply linear
MTE, CWS,
4. 4 Linear Congruence congruence and its 2 Lecture ETE
applications
Demonstrate the
Substitution Ciphers-1 MTE, CWS,
5. 5 working of substitution 1 Lecture ETE
ciphers
Substitution Ciphers-2 Demonstrate the
MTE, CWS,
6. 6 working of substitution 1 Lecture ETE
ciphers
Learning
Solve problems on
through MTE, CWS,
16. Tutorial Session Finite fields and 3
problem- ETE
Simplified DES
solving
Lecture/
18. 2 Variants of DES Understanding Flipped MTE, CWS,
3
4 variants of DES Classroo ETE
m
Technolo
Block Cipher Modes of Demonstration of MTE, CWS,
19. 3 gy based
Operation modes of operation ETE
learning
Understanding key
21. 2 AES Key Expansion MTE, CWS,
expansion of AES 3 Lecture
6 ETE
algorithm
Technolo
22. 2 Security issues of DES Illustrating attacks on
3
MTE, CWS,
gy based
7 and AES DES and AES ETE
learning
Learning
through MTE, CWS,
23. Tutorial Session Solve Simplified AES 3
problem- ETE
solving
Utilize number theory MTE, CWS,
24. Number Theory 2 Lecture
and its applications ETE
Solve problems on
25. 2 Euler’s Theorem and Euler’s theorem and
2 Lecture CWS, ETE
8 Fermat’s Little Theorem Fermat’s Little
theorem
Learning
Solve problems on through MTE, CWS,
26. Tutorial Session 2
Number Theory Topics problem- ETE
solving
Make use of
27. Asymmetric key ciphers: asymmetric key MTE, CWS,
4 Lecture
RSA ciphers and RSA ETE
algorithm
Diffie Hellman Make use of Diffie MTE, CWS,
28. 4 Lecture
Cryptosystem Hellman cryptosystem ETE
Make use of Elgamal MTE, CWS,
29. Elgamal cryptosystem 4 Lecture
cryptosystem ETE
Elliptic curve Make use of Elliptic MTE, CWS,
30. 4 Lecture
cryptography-1 Curve cryptography ETE
Elliptic curve Make use of Elliptic MTE, CWS,
31. 4 Lecture
cryptography-2 Curve cryptography ETE
Learning
Make use of
through MTE, CWS,
32. Tutorial Session asymmetric key 4
problem- ETE
ciphers
solving
MID TERM EXAMINATION
Lecture/
39. 4 Blind and undeniable Illustrate Blind and Flipped
5 CWS, ETE
1 Undeniable Signatures Classroo
signatures
m
Lecture/
40. 4 Passwords, challenge- Know the concept of
5 Flipped CWS, ETE
2 response algorithms CR algorithms Classroo
m
Know the concept of Lecture/
41. 4 Zero-knowledge zero- knowledge 5 Flipped CWS, ETE
3 protocols protocols Classroo
m
Explain the
45. 4 Electronic Mail Security concept of Electronic 5 Peer CWS, ETE
7 Mail Security teaching
46. 4 Pretty Good Privacy Demonstrate the
5 CWS, ETE
Lecture
8 (PGP) concept of PGP