[go: up one dir, main page]

0% found this document useful (0 votes)
10 views2 pages

TBC 504 Cryptography_Syllabus

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 2

Course Name: Bachelor of Computer Applications

Subject Name: Cryptography Subject Code: TBC-504

1 Contact Hours: 42 L 3 T0 P 0

2 Examination Duration(Hrs): Theory 0 3 Practical 0 0

3 Relative Weightage: CWE: 25 MTE: 25 ETE: 50

4 Credits: 0 3

5 Semester: 
Autumn Spring Both

6 Pre-Requisite: Basics of the Networking

7 Subject Area: Cryptography and Security

8 Objective: To familiarize students with the Security algorithms regarding the


networking issue

9 Course Outcome: A student who successfully fulfills the course requirements will be
able to-
a. Identify some of the factors driving the need for security and cryptography.
b. Identify and classify particular examples of attacks.
c. Understand the basics of symmetric key cryptography.
d. Understand the basics of Asymmetric key cryptography.
e. Understand the concept of Hash functions and their use.
f. Understand the basics Digital Signatures.

10 Details of the Course:


Unit CONTENT CONTACT
No. HOURS
1 Introduction to Cryptography: Introduction To Cryptography,Security 9
Goals, Cryptographic Attacks. Mathematics of Cryptography: Modular
Arithmetic, Congruence and Matrices. Conventional Encryption
Model,Symmetric Key Ciphers, Categories of Symmetric Key Ciphers.
Stream and Block Ciphers,
2 Modern Block Ciphers: Components of Modern Block Ciphers, Thoughts 9
of Feistel Design, Block Cipher Principles,Product Ciphers. Simplified
DES, DES Structure, DES Standard, DES Strength, Differential & Linear
Cryptanalysis, Block Cipher Design Principles, Block Cipher Modes Of
Operation.
Multiple DES: Double DES, Triples DES. Introduction to AES.

Graphic Era Hill University, 2021, Review-6, w.e.f.: 2021-22


3 Advanced Encryption Algorithms: Blowfish Algorithm, International 8
Data Encryption Algorithm, RC-5, Symmetric Key Distribution, Random
Number Generators, Placement of Encryption Function.
4 Public Key Encryption:Difference between Symmetric and Asymmetric 8
key Cryptosystems, Public-Key Cryptography: Principles of Public-Key
Cryptosystems, RSA Algorithm, Rabin Cryptosystem, ElGamal
Cryptosystem, Key Management, Public Key Distribution, Fermat’s &
Euler’s Theorem.
5 Hash Functions: Message Authentication & Hash Functions: 8
Authentication Requirements, Authentication Functions, Message
Authentication Codes, Hash Functions, Security Of Hash Function &
MACS, MD-5 Message Digest Algorithm, Secure Hash Algorithm (SHA-
512), Digital Signatures: Digital Signature Standard, Authentication
Protocol, Digital Signature Algorithm (DSA).
TOTAL 42

11 Suggested Books:
Sl. YEAR OF
NO. NAME OF AUTHERS/BOOKS/PUBLISHERS PUBLICAT
ION
1 William Stallings, “Cryptography and Network Security: Principles and 2002
Practice”, Prentice Hall, New Jersey.
2 Johannes A. Buchmann, “Introduction to cryptography”, Springer- 2004
Verlag.
3 Atul Kahate, “Cryptography and Network Security”, TMH 2008
4 Behrouz A Forouzan, “Cryptography and Network Security”, McGraw 2016
Hill, 3rd ED.

Graphic Era Hill University, 2021, Review-6, w.e.f.: 2021-22

You might also like