0% found this document useful (0 votes)
37 views9 pages

Cryptography: Sunita Prasad M.Tech

The document provides an overview of a cryptography course. The course objectives are to provide an in-depth study of cryptographic techniques, algorithms, and protocols. It aims to give students the ability to analyze cryptographic and cryptanalytic algorithms and understand how to construct security protocols for confidentiality, authentication, data integrity and non-repudiation. Upon completing the course, students are expected to understand cryptography mathematics, algorithms, security functions, and emerging techniques. Assessment includes homework assignments and exams. The document also lists some example papers related to hardware implementations of public key cryptography.

Uploaded by

Rahul Bhatia
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views9 pages

Cryptography: Sunita Prasad M.Tech

The document provides an overview of a cryptography course. The course objectives are to provide an in-depth study of cryptographic techniques, algorithms, and protocols. It aims to give students the ability to analyze cryptographic and cryptanalytic algorithms and understand how to construct security protocols for confidentiality, authentication, data integrity and non-repudiation. Upon completing the course, students are expected to understand cryptography mathematics, algorithms, security functions, and emerging techniques. Assessment includes homework assignments and exams. The document also lists some example papers related to hardware implementations of public key cryptography.

Uploaded by

Rahul Bhatia
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 9

Cryptography

Sunita Prasad M.Tech

Books

Objectives of the Course (1)


The course provides an in depth study of cryptographic techniques and their role in practical computer systems Provide students with a basic understanding of cryptographic algorithms and protocols Knowledge of issues involved in the choice of algorithms and the key size

Objective of the Course (2)


Ability to analyze the performance of various cryptographic and cryptanalytic algorithms It covers the algorithms for symmetric and asymmetric encryption, hash function to achieve practical security objectives such as confidentiality, authentication, data integrity and non repudiation

Expectation upon completion


Understand the mathematical properties and techniques for cryptography Understand the algorithms of cryptography including encryption and hash functions Estimate the strength of the cryptographic functions Use cryptographic algorithms to construct protocols for various security objectives Appreciate emerging techniques and future development of cryptography

Assessment of students
Home assignments involving design, analysis or execution of cryptographic procedures Two exams

Applications
Low cost chip implementation of DES and AES is available Research is active in the area of RSA and ECC cryptographic algorithms.

Some Papers (1)


A Reconfigurable Public Key Cryptography Coprocessor X.Zeng, C. Chen and O. Zhang
It deals with the architecture of RSA/ECC Coprocessor

Hardware Architectures for Public Key Cryptography L.Batina, S. B. Ors and B. Preneel
Presents and overview of hardware implementations for PK cryptography i.e. RSA and ECC based on modular arithmetic

Single Chip FPGA Implementations of a cryptographic coprocessor Francis Gome

Some Papers (2)


Latest Generation of Crypto Smart cards Capabilities and Applications Lin Yih Using ECC for Enhanced Embedded Security Jerry Krashner ECC Signature Generation Device for RFID- B. Ansari
Architecture for fast EC Coprocessor -

You might also like