UNIT 1:
Introduction to cryptography
Security trends. Legal, Ethical and Professional Aspects of Security
Need for Security at Multiple levels, Security Policies - Model of network security
Security attacks, services and mechanisms – OSI security architecture
Classical encryptions techniques: substitution techniques-01
Classical encryptions techniques: substitution techniques-02
Transposition Techniques and Steganography
Foundations of Modern Cryptography-Cryptanalysis
Perfect security – Information theory – Product cryptosystem Industry/Tech : Fin Tech & AI / ML Data Analytics
UNIT 2:
MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures- Groups, Rings, Fields
Modular arithmetic-Euclid’s algorithm
SYMMETRIC KEY CIPHERS: SDES – Block cipher Principles of DES – Strength of DES
Differential and linear cryptanalysis
Block cipher design principles – Block cipher mode of operation
Evaluation criteria for AES – Advanced Encryption Standard-01
Evaluation criteria for AES – Advanced Encryption Standard-02
UNIT 3:
MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing
Euler’s totient function, Fermat’s and Euler’s Theorem
Chinese Remainder Theorem
ASYMMETRIC KEY CIPHERS: RSA cryptosystem
Key distribution – Key management
Diffie Hellman key exchange
UNIT 4:
Authentication requirement – Authentication function
Security of hash function and MAC
Digital signature and authentication protocols
Digital Signature Standard (DSS)
Entity Authentication: Biometrics, Passwords
Challenge Response protocols
UNIT 5:
Security: Architecture, Authentication header
Encapsulating security payloads, combining security associations, key management
Web Security: Secure socket layer
System Security: Intruders
firewall design principals