Classical Encryption Techniques:
Symmetric cipher model, Substitution techniques, Transposition techniques (Text 1: Chapter 1)
Basic Concepts of Number Theory and Finite Fields:
Euclidean algorithm, Modular arithmetic (Text 1: Chapter 3)
SYMMETRIC CIPHERS:
Traditional Block Cipher structure, Data encryption standard (DES), The AES Cipher. (Text 1: Chapter 2: Section1, 2, Chapter 4:Section 2, 3, 4)
Basic Concepts of Number Theory and Finite Fields:
Groups, Rings and Fields, Finite fields of the form GF(p), Prime Nwnbers, Fermat's and Euler's theorem, discrete logarithm. (Text 1: Chapter 3 and Chapter 7: Section 1, 2, 5),
ASYMMETRIC CIPHERS:
Principles of Public-Key Cryptosystems, The RSA algorithm, Diffie - Hellman Key Exchange, Elliptic Curve Arithmetic, Elliptic Curve Cryptography (Text 1:Chapter 8, Chapter 9: Section 1,3, 4)
Pseudo-Random-Sequence Generators and Stream Ciphers:
Linear Congruential Generators, Linear Feedback Shift Registers, Design and analysis of stream ciphers, Stream ciphers using LFSRs, A5, Hughes XPD/ KPD, Nanoteq, Rambutan, Additive generators, Gifford, Algorithm M,PKZIP (Text 2: Chapter 16),
Course Outcomes:
After studying this course, students will be able to:
1. Explain basic cryptographic algorithms to encrypt and decrypt the data.
2 Use symmetric and asymmetric cryptography algorithms to encrypt and decrypt the information.
3. Describe the mathematics associated with cryptography.
4. Apply concepts of modern algebra in cryptography algorithms.
5. Apply pseudo random sequence in stream cipher algorithms.
Question paper pattern:
Text Books:
1. William Stallings , "Cryptography and Network Security Principles and Practice", Pearson Education Inc., 6th Edition, 2014, ISBN: 978-93- 325-1877-3
2. Bruce Schneier, "Applied Cryptography Protocols, Algorithms, and Source code in C",Wiley Publications, 2nd Edition, ISBN: 9971-51-348-X.
Reference Books:
1. Cryptography and Network Security, BehrouzA. Forouzan, TMH, 2007.
2 Cryptography and Network Security, Atul Kahate, TMH, 2003.