top of page

Applied Cryptography

Course Code:


Course Credits:




Executive M.Tech

Semester 2

About the Course:

Cryptography is the science of securing data by using mathematical concepts. Cryptography involves the authentication and verification of data in all domains by applying Cryptographic protocols.

Course Objectives:

  • Enable to learn the fundamental concepts of cryptography and utilize these techniques in computing systems.

  • Discuss about various encryption techniques.

  • Understand the concept of public key Cryptography.

  • Introduce message authentication and hash function.

  • Provide Lab sessions for each unit to help gain deeper insight into Cryptography.

Course Outcomes:

At the end of this course, the student will be able to:

  • Classify the symmetric encryption techniques.

  • Illustrate various Public key cryptographic techniques.

  • Evaluate the authentication and hash algorithms.

  • Discuss authentication applications

Course Content:

Unit 1:

Introduction to applied cryptosystems and hashing - 12 Hours

Message authentication (MAC, HMAC, SHA),Simultaneous message integrity and confidentiality, User Authentication, Merkle tree, Hashing , Blockchain , Hash Tree (merkel tree / Block chain),Authorization and Accountability, Deduplication / fingerprinting, Portable devices, Bitlocker, Crypto shredding, disk encryption

Unit 2:

Email security and secure communication - 12 Hours

Digital Signatures, Email, PGP, S/MIME, Remote connection - SSH, Password-less SSH, EMV Chip transaction; Tokenization, transmission protection, Code signing

Unit 3:

Emerging Cryptosystem - 12 Hours

Tor, and dark web, Quantum computing, Lightweight Crypto, Homomorphic Encryption, Post Quantum Cryptography, Learning with Errors Algorithm

Unit 4:

Managing Identity and Authentication - 10 Hours


Unit 5:

Attacks on modern - 10 Hours

zero knowledge proof/protocol, Applications Zero knowledge proof, Forward Secrecy, Deffie Hellman Key Exchange


1:“Introduction to Modern Cryptography”, Jonathan Katz, Yehuda Lindell, 2ndEdition, CRC Press, 2015

Refrence Books:

“Cryptography and Network Security” Behrouz A.Foruzan, 3rd Edition, Tata McGraw Hill, 2017

Tools & Languages:

Seed virtual machine environment, gpg, Python

Course Content:

bottom of page