About the Course:
Cryptography is the science of securing data by using mathematical concepts. Cryptography involves the authentication and verification of data in all domains by applying Cryptographic protocols.
Enable to learn the fundamental concepts of cryptography and utilize these techniques in computing systems.
Discuss about various encryption techniques.
Understand the concept of public key Cryptography.
Introduce message authentication and hash function.
Provide Lab sessions for each unit to help gain deeper insight into Cryptography.
At the end of this course, the student will be able to:
Classify the symmetric encryption techniques.
Illustrate various Public key cryptographic techniques.
Evaluate the authentication and hash algorithms.
Discuss authentication applications
Introduction to applied cryptosystems and hashing - 12 Hours
Message authentication (MAC, HMAC, SHA),Simultaneous message integrity and confidentiality, User Authentication, Merkle tree, Hashing , Blockchain , Hash Tree (merkel tree / Block chain),Authorization and Accountability, Deduplication / fingerprinting, Portable devices, Bitlocker, Crypto shredding, disk encryption
Email security and secure communication - 12 Hours
Digital Signatures, Email, PGP, S/MIME, Remote connection - SSH, Password-less SSH, EMV Chip transaction; Tokenization, transmission protection, Code signing
Emerging Cryptosystem - 12 Hours
Tor, and dark web, Quantum computing, Lightweight Crypto, Homomorphic Encryption, Post Quantum Cryptography, Learning with Errors Algorithm
Managing Identity and Authentication - 10 Hours
PKI/CA, SSL TLS , IPSEC
Attacks on modern - 10 Hours
zero knowledge proof/protocol, Applications Zero knowledge proof, Forward Secrecy, Deffie Hellman Key Exchange
1:“Introduction to Modern Cryptography”, Jonathan Katz, Yehuda Lindell, 2ndEdition, CRC Press, 2015
“Cryptography and Network Security” Behrouz A.Foruzan, 3rd Edition, Tata McGraw Hill, 2017
Tools & Languages:
Seed virtual machine environment, gpg, Python