About the Course:
Cryptography is the science of securing data by using mathematical concepts. Cryptography involves the authentication and verification of data in all domains by applying Cryptographic protocols.
Course Objectives:
Enable to learn the fundamental concepts of cryptography and utilize these techniques in computing systems.
Discuss about various encryption techniques.
Understand the concept of public key Cryptography.
Introduce message authentication and hash function.
Provide Lab sessions for each unit to help gain deeper insight into Cryptography.
Course Outcomes:
At the end of this course, the student will be able to:
Classify the symmetric encryption techniques.
Illustrate various Public key cryptographic techniques.
Evaluate the authentication and hash algorithms.
Discuss authentication applications.
Course Content:
Unit 1:
Classical Ciphers - 12 Hours
Introduction to cryptography, CIA Triad IAAA, Legal, ethical, and professional aspects of security, Crypto math-1, Classical Ciphers , Crypto math-2, Transposition, Steganography
Unit 2:
Symmetric Key Cryptography - 12 Hours
Principles of modern cryptography, Classical v/s Modern , Cryptanalysis, Kerckhoffs's principle, Perfect secrecy, Vernam's One Time Pad, Shannon's Theorem, Stream ciphers, Block ciphers Birthday attack, Pseudo-random numbers
Unit 3:
Public Key Cryptography - 12 Hours
Introduction to Symmetric key cryptography, Fiestel cipher, DES, AES, Modes of operation of block Ciphers, Padding attack
Unit 4:
Key management Hashing Techniques - 10 Hours
Introduction to Public key cryptography, One way functions, DH Protocol, Elgamal Crypto, Prime Factorization - hardness, RSA, Applications (in terms of CIA and IAAA)
Unit 5:
Authentication using Cryptography - 10 Hours
Key management and distribution (KDC), Kerberos, Zero knowledge protocols, MD5, Collision-resistant hash function (CRHF), Secure Hash Algorithm (SHA), Digital signature, ECC based signature, ECDSA, MAC, and chaining MAC
Textbooks:
1:“Introduction to Modern Cryptography”, Jonathan Katz, Yehuda Lindell, 2ndEdition, CRC Press, 2015.
Refrence Books:
“Cryptography and Network Security” Behrouz A.Foruzan, 3rd Edition, Tata McGraw Hill, 2017
Tools & Languages:
Seed virtual machine environment, gpg, Python
Course Content: