Course Title: Introduction to Cryptography



Course no: CSC-313                                                                           Full Marks: 60+20+20
Credit hours: 3                                                                                      Pass Marks: 24+8+8
Nature of course: Theory (3 Hrs.) + Lab (3 Hrs.)
Goal: The course objective is to familiarize basic concepts of cryptography so as the students can use their understanding for information security purpose.

Course Contents:

Unit 1. Introduction                                                       4 Hrs.
Security, Attacks, Attack Types, Viruses, Worms, Trojan Horses, Classical Cryptography

Unit 2. Basics of Modern Cryptography                                     5 Hrs.
Plaintext, Ciphertext, keys, simple ciphers, public key cryptography, digital signatures

Unit 3. Conventional Encryption / Secret Key Cryptography                 10 Hrs.
Cryptography, Cryptanalysis, Cipher Structure, Encryption Algorithms, Data Enncryption Standard (DES), International Data Encryption Algorithm (IDEA), Advanced Encryption Standard (AES), Modes of Operation, Symmetric Block Ciphers, Cipher Block Chaining (CBC), Multiple Encryption DES

Unit 4. Public Key Cryptography                                         6 Hrs.
Basic Number Theory, Factorization, Diffie-Hellman Key Exchange, Public Key Cryptography Algorithms, RSA.

Unit 5. Digital Signatures                                                4 Hrs.
One-time signatures, Digital Signature Standard (DSS).

Unit 6. Hashing and Message Digests                                       6 Hrs.
Hashes, Motivation and applications. Cryptographically Secure Hashing, Secure Hash Algorithm (SHA), Encryption with Message Digest (MD), MD5.

Unit 7. Authentication and Public Key Infrastructure (PKI)                5 Hrs.
Overview of Authentication Systems (Password, Address, Cryptographic), Security Handshake Pitfalls, Authentication Standards, Kerberos, PKI Trust Models.

Unit 8. Network Security                                                   5 Hrs.
IP Security, Web Security, Secure Socket Layer (SSL), Transport Layer Security (TLS), Different versions of SNMPs, PGP.

Text / Reference books :

    D. R. Stinson. Cryptography: Theory and Practice. CRC Press
    William Stallings, Network Security Essentials-Applications & Standards, Pearson.
    Charlie Kaufman, Radia Perlman, Mike Speciner, Nework Security Private Communication in a Public World, Second Edition, 2004,Pearson.
    Matt Bishop, Computer Security, Art and Science, Pearson
    Bruce Schneier,  Applied Cryptography,  Pearson

Related Posts:

  • E - Governance Notes 1.) E - Governance complete notes 2.) E - Governance Notes  3.) E - Governance Miscellaneous Notes 4.) E - Governance Self Prepared Note (may be incomplete ) 5.) Cyber Law Notes 6.) E - Governance Misce… Read More
  • Database Management System Notes / Study Materials Click on the following link : Database Management system - (SE-TE) Vidyalankar (book). DBMS book by SADGURU DBMS Lecture Notes DBMS Notes by Bipul Kumar Yadav DBMS Student Prepared Notes … Read More
  • Wireless Networking Notes 1.) Wireless Networking Complete Notes 2.) Wireless Networking Notes 3.) Wireless Notes by Achyut Nand Mishra    4.) Wireless Notes … Read More
  • Technical Writing Study MaterialsHere are the study materials for Technical Writing : 1.) Technical Writing Notes ( download ) 2.) Business Letters ( download ) 3.) Presentation Notes ( download ) 4.)Sample format of meeting minutes ( download ) 5.… Read More
  • Fourth Semester Micro SyllabusClick on the following links to download the micro-syllabus of respective subjects. Theory of Computation                        ( download ) System Analysis a… Read More

2 comments:

  1. I've been using AVG Antivirus for a few years now, and I would recommend this anti virus to everyone.

    ReplyDelete
  2. The comprehensive curriculum and hands-on approach ensure a thorough grasp of cryptographic techniques and their applications. The Game Share Your dedication to training future professionals in safeguarding digital communication is truly commendable.

    ReplyDelete

.

.