[go: up one dir, main page]

0% found this document useful (0 votes)
472 views3 pages

Applied Cryptography Syllabus

This document outlines the curriculum for a course titled "Applied Cryptography" which introduces students to cryptography and cryptanalysis through 5 modules covering mathematical foundations, symmetric key ciphers, hash functions, digital signatures, and network security. The course aims to develop an understanding of cryptography algorithms and their design choices through lectures, labs involving experiments with cryptographic tools and protocols, and assessments of theory and practical skills.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
472 views3 pages

Applied Cryptography Syllabus

This document outlines the curriculum for a course titled "Applied Cryptography" which introduces students to cryptography and cryptanalysis through 5 modules covering mathematical foundations, symmetric key ciphers, hash functions, digital signatures, and network security. The course aims to develop an understanding of cryptography algorithms and their design choices through lectures, labs involving experiments with cryptographic tools and protocols, and assessments of theory and practical skills.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Annexure

‘CD – 01’

FORMAT FOR COURSE CURRICULUM

Course Title: Applied Cryptography L T P/S SW/F TOTAL


Credit Units:4 W CREDIT
UNITS
3 - 2 - 4
Course Level:UG
Course Code:

Course Objectives: The aim of this course is to introduce the student to the areas of cryptography and cryptanalysis. This course develops a basic
understanding of the algorithms used to protect users online and to understand some of the design choices behind these algorithms. To develop a workable
knowledge of the mathematics used in cryptology in this course. The course deals with modern trends in asymmetric key cryptography, namely using Elliptic
Curves. The course concludes with the design rationale of network protocols for key exchange and attacks on such protocols.

Pre-requisites: Computer Networks, Basic Mathematics

Course Contents/Syllabus:
Weightage (%)
Module I Introduction and Mathematical Foundations 20%
Descriptors/Topics
Overview on Modern Cryptography, Number Theory, Probability and Information Theory, Classical Cryptosystems,
Cryptanalysis of Classical Cryptosystems, Shannon’s Theory

Module II Symmetric Key Ciphers 20%


Descriptors/Topics
Symmetric Key Ciphers, Modern Block Ciphers (DES),AES, Linear Cryptanalysis, Differential Cryptanalysis. ,Other Cryptanalysis
techniques, Overview on S-Box Design Principles, Modes of operation of Block Ciphers, Stream Ciphers
Module III Hash Functions and MACs 20%
Descriptors/Topics
Hash functions: The Merkle Damgard Construction, Message Authentication Codes (MACs), Asymmetric Key Ciphers: More
Number Theoretic Results, The RSA Cryptosystem, Primality Testing, Factoring Algorithms
Module IV Digital Signatures 20%
Descriptors/Topics The Discrete Logarithm Problem (DLP) and the Diffie Hellman Key Exchange algorithm, Signature schemes,
Elliptic curve based cryptography

Module V Network Security 20%


Descriptors/Topics Secret Sharing Schemes, Kerberos, PGP, Intruders, Firewalls, Viruses

Student Learning Outcomes:

• Enable the students to learn fundamental concepts of cryptography.


• Enable students to learn about symmetric and asymmetric cryptography
• To learn about Hash Tables and Message authentication codes
• To learn various algorithms of digital signature ,cryptography and network security
• To learn fundamental concepts of network security

Pedagogy for Course Delivery:


Lectures, Lab, NPTEL Videos

Lab/ Practicals details, if applicable:


List of Experiments:

• Monoalphabetical ciphers Caeser cipher Cryptanlysis, Frequency analysis


• Introduction to OpenSSL Introduction to Federal Information Processing Standards (FIPs)
• Symmetric Key Cryptography Pseudo random number generation DES key creation Encryption and decryption with DES File integrity with MD5 hash
• Symmetric Key Distribution With NetCat With Apache Key compromise by protocol analyzer (Wireshark)
• Message Authentication Codes
• Digital Signature generation
• Password Auditing/Cracking
• Intrusion Detection
• Stegnography
• Open ended

Assessment/ Examination Scheme:

Theory L/T (%) Lab/Practical/Studio (%) Total

75% 25% 100


Theory Assessment (L&T):
Continuous Assessment/Internal Assessment(40 %) End Term
Examination (60%)
Components (Drop Attendance Class Test Assignment Case Study
down)
Weightage (%) 5 10 7 8 60

Lab Assessment

Continuous Assessment/Internal Assessment(40%) End Term


Examination (60%)
Components (Drop Attendance Lab Record Performance viva
down)
Weightage (%) 5 10 15 10 60

Text Reading:
• Douglas Stinson, "Cryptography Theory and Practice", 2 nd Edition, Chapman & Hall/CRC.
• W. Stallings, "Cryptography and Network Security", Pearson Education.

References:
• B. A. Forouzan, "Cryptography & Network Security", Tata Mc Graw Hill.


Additional Reading:

• Wenbo Mao, "Modern Cryptography, Theory & Practice", Pearson Education.


• Hoffstein, Pipher, Silvermman, "An Introduction to Mathematical Cryptography", Springer.
• J. Daemen, V. Rijmen, "The Design of Rijndael", Springer.
• A. Joux,"Algorithmic Cryptanalysis", CRC Press.
• S. G. Telang, "Number Theory", Tata Mc Graw Hill.
• C. Boyd, A. Mathuria, "Protocols for Authentication and Key Establishment", Springer.
• Matt Bishop, "Computer Security", Pearson Education.

Any other Study Material:


• https://nptel.ac.in/syllabus/106105031/

You might also like