18EC744 Cryptography syllabus for EC



A d v e r t i s e m e n t

Module-1 Classical Encryption Techniques 8 hours

Classical Encryption Techniques:

Symmetric cipher model, Substitution techniques, Transposition techniques (Text 1: Chapter 1)

Basic Concepts of Number Theory and Finite Fields:

Euclidean algorithm, Modular arithmetic (Text 1: Chapter 3)

Module-2 SYMMETRIC CIPHERS 8 hours

SYMMETRIC CIPHERS:

Traditional Block Cipher structure, Data encryption standard (DES), The AES Cipher. (Text 1: Chapter 2: Section1, 2, Chapter 4:Section 2, 3, 4)

Module-3 Basic Concepts of Number Theory and Finite Fields 8 hours

Basic Concepts of Number Theory and Finite Fields:

Groups, Rings and Fields, Finite fields of the form GF(p), Prime Nwnbers, Fermat's and Euler's theorem, discrete logarithm. (Text 1: Chapter 3 and Chapter 7: Section 1, 2, 5),

Module-4 ASYMMETRIC CIPHERS 8 hours

ASYMMETRIC CIPHERS:

Principles of Public-Key Cryptosystems, The RSA algorithm, Diffie - Hellman Key Exchange, Elliptic Curve Arithmetic, Elliptic Curve Cryptography (Text 1:Chapter 8, Chapter 9: Section 1,3, 4)

Module-5 Pseudo-Random-Sequence Generators and Stream Ciphers 8 hours

Pseudo-Random-Sequence Generators and Stream Ciphers:

Linear Congruential Generators, Linear Feedback Shift Registers, Design and analysis of stream ciphers, Stream ciphers using LFSRs, A5, Hughes XPD/ KPD, Nanoteq, Rambutan, Additive generators, Gifford, Algorithm M,PKZIP (Text 2: Chapter 16),

 

Course Outcomes:

After studying this course, students will be able to:

1. Explain basic cryptographic algorithms to encrypt and decrypt the data.

2 Use symmetric and asymmetric cryptography algorithms to encrypt and decrypt the information.

3. Describe the mathematics associated with cryptography.

4. Apply concepts of modern algebra in cryptography algorithms.

5. Apply pseudo random sequence in stream cipher algorithms.

 

Question paper pattern:

  • Examination will be conducted for 100 marks with question paper containing 10 full questions, each of 20 marks.
  • Each full question can have a maximum of 4 sub questions.
  • There will be 2 full questions from each module covering all the topics of the module.
  • Students will have to answer 5 full questions, selecting one full question from each module.
  • The total marks will be proportionally reduced to 60 marks as SEE marks is 60.

 

Text Books:

1. William Stallings , "Cryptography and Network Security Principles and Practice", Pearson Education Inc., 6th Edition, 2014, ISBN: 978-93- 325-1877-3

2. Bruce Schneier, "Applied Cryptography Protocols, Algorithms, and Source code in C",Wiley Publications, 2nd Edition, ISBN: 9971-51-348-X.

 

Reference Books:

1. Cryptography and Network Security, BehrouzA. Forouzan, TMH, 2007.

2  Cryptography and Network Security, Atul Kahate, TMH, 2003.

Last Updated: Tuesday, January 24, 2023