TBC 504 Cryptography_Syllabus
TBC 504 Cryptography_Syllabus
TBC 504 Cryptography_Syllabus
1 Contact Hours: 42 L 3 T0 P 0
4 Credits: 0 3
5 Semester:
Autumn Spring Both
9 Course Outcome: A student who successfully fulfills the course requirements will be
able to-
a. Identify some of the factors driving the need for security and cryptography.
b. Identify and classify particular examples of attacks.
c. Understand the basics of symmetric key cryptography.
d. Understand the basics of Asymmetric key cryptography.
e. Understand the concept of Hash functions and their use.
f. Understand the basics Digital Signatures.
11 Suggested Books:
Sl. YEAR OF
NO. NAME OF AUTHERS/BOOKS/PUBLISHERS PUBLICAT
ION
1 William Stallings, “Cryptography and Network Security: Principles and 2002
Practice”, Prentice Hall, New Jersey.
2 Johannes A. Buchmann, “Introduction to cryptography”, Springer- 2004
Verlag.
3 Atul Kahate, “Cryptography and Network Security”, TMH 2008
4 Behrouz A Forouzan, “Cryptography and Network Security”, McGraw 2016
Hill, 3rd ED.