Fifth Semester
Cryptography
Course Description: The course introduces the underlying the principles and design of cryptosystems. The course covers the basics concepts of cryptography including: traditional ciphers, block ciphers, stream ciphers, public and private key cryptosystems. The course also includes the theory of hash functions, authentication systems, network security protocols and malicious logic.
Course Objectives: The objectives of this course are to familiarize the students with cryptography and its applications. The students will be able to develop basic understanding of cryptographic mechanisms.
Contents of Chapter |
|---|
Unit 1: Introduction and Classical Ciphers (7 hr)
1.1. Security: Computer Security, Information Security, Network Security,
CIA Triad, Cryptography, Cryptosystem, Cryptanalysis, Security Threats and
Attacks, Security Services, Security Mechanisms |
Unit 2: Symmetric Ciphers (10 hr.)
2.1. Fiestel Cipher Structure, Substitution Permutation Network (SPN) |
Unit 3: Asymmetric Ciphers (8 hr)
3.1. Number Theory: Prime Numbers, Fermat’s Theorem, Euler’s Theorem,
Primility Testing, Miller-Rabin Algorithm, Extended Euclidean Theorem,
Discrete Logarithms |
Unit 4: Cryptographic Hash Functions and Digital Signatures (8 hr)
4.1. Message Authentication, Message Authentication Functions, Message
Authentication Codes |
Unit 5: Authentication (3 Hrs)
5.1. Authentication System, |
Unit 6: Network Security and Public Key Infrastructure (6 Hrs)
6.1. Overview of Network Security |
Unit 7: Malicious Logic (3 Hrs)
7.1. Malicious Logic, Types of Malicious Logic: Virus, Worm, Trojan Horse,
Zombies, Denial of Service Attacks, |