UNIT 1:
Introduction to cryptography
Security trends. Legal, Ethical and Professional Aspects of Security
Need for Security at Multiple levels, Security Policies - Model of network security
Security attacks, services and mechanisms – OSI security architecture
Classical encryptions techniques: substitution techniques-01
Classical encryptions techniques: substitution techniques-02
Transposition Techniques and Steganography
Foundations of Modern Cryptography-Cryptanalysis
Perfect security – Information theory – Product cryptosystem
UNIT 2:
MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures- Groups, Rings, Fields
Modular arithmetic-Euclid’s algorithm
SYMMETRIC KEY CIPHERS: SDES – Block cipher Principles of DES – Strength of DES
Differential and linear cryptanalysis
Block cipher design principles – Block cipher mode of operation
Evaluation criteria for AES – Advanced Encryption Standard-01
Evaluation criteria for AES – Advanced Encryption Standard-02
UNIT 3:
MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing
Euler’s totient function, Fermat’s and Euler’s Theorem
Chinese Remainder Theorem
Key distribution – Key management
Diffie Hellman key exchange
ASYMMETRIC KEY CIPHERS: RSA cryptosystem
UNIT 4:
Authentication requirement – Authentication function
Security of hash function and MAC
Digital signature and authentication protocols
Digital Signature Standard (DSS)
Entity Authentication: Biometrics, Passwords
Challenge Response protocols
UNIT 5:
SYSTEM SECURITY: Intruders