About the Course:
Cryptography is the science of securing data by using mathematical concepts. Cryptography involves the authentication and verification of data in all domains by applying Cryptographic protocols
Enable to learn the fundamental concepts of cryptography and utilize these techniques in computing systems.
Discuss about various encryption techniques.
Understand the concept of public key Cryptography.
Introduce message authentication and hash function.
Provide Lab sessions for each unit to help gain deeper insight into Cryptography.
At the end of the course the student will be able to,
Appreciate the impact of cyber-attacks on the society and the necessity of cryptography.
Analyse Cryptographic techniques using the mathematical foundations of cryptography.
Design applications/protocols using cryptographic techniques.
Apply cryptanalysis to solve real time problems.
Evaluate the authentication and Hash Algorithms.
Introduction to Cryptography - 10 Hours
Why Cryptography?, Security trends – legal, ethical and professional aspects of security, Basic Cryptographic primitives (encryption, decryption, signatures, authentication), Classical encryption techniques : substitution technique, transposition techniques, Steganography, Historical Ciphers and their cryptanalysis, Classical vs Modern cryptography
Modern Cryptography - 12 Hours
Principles of Modern cryptography, Perfectly-secret encryption – Vernam’s One-time- pad encryption – Limitations, Shannon’s theorem, Stream Ciphers, Block cipher design principles, Block vs Stream cipher
Private Key Cryptography - 10 Hours
Mathematical Modular arithmetic-Euclid’s algorithm, Congruence and matrices, Algebraic structures: Groups, Rings, Fields- Finite fields, Pseudorandom Generators (PRNG), Private/Symmetric Key Ciphers: Fiestel network, DES, AES, Cryptanalysis: Block cipher mode of operation, Chosen-CiphertextAttacks, , Differential and linear cryptanalysis
Public Key Cryptography - 12 Hours
Mathematics of Public Key Cryptography: Primes, Factorization, Chinese Remainder Theorem, Key Management and the Public Key Revolution: Key distribution and Key Management, Diffie Hellman Protocol, Elgamal encryption, RSA Encryption : Algorithm, Implementation issues and Pitfalls, Rabin Encryption Scheme: Trapdoor, Scheme, Digital Signature: Certificates and Public Infrastructure, Attacks, Scheme, Applications, Signatures from Hash Functions
MAC and Hash - 12 Hours
Message Authentication Code (MAC) – Definition, Message Integrity, Cipher Block Chaining (CBC-MAC), Constructing Secure message Authentication codes, Authenticated Encryption, Hash Functions and Applications: MAC using Hash functions HMAC, Generic Attacks on Hash Functions, Random Oracle Model, Applications, Hash functions: MD5, SHA, collision resistant hashing, Merkle-Damgrad and Davies Meyer
1: “Introduction to Modern Cryptography” ,Jonathan Katz, Yehuda Lindell, CRC Press, 2018.
1: “Cryptography and Network Security”, BehrouzA.Foruzan, Tata McGraw Hill 2007.
Tools & Languages:
Seed virtual machine environment