CSE1011 Cryptography Fundamentals L T P J C 2 0 2 4 4: Objectives
CSE1011 Cryptography Fundamentals L T P J C 2 0 2 4 4: Objectives
CSE1011 Cryptography Fundamentals L T P J C 2 0 2 4 4: Objectives
1 INTRODUCTION TO SECURITY
Information Security - Confidentiality, Integrity &
Availability – Authentication, Authorization & Non- 4 1
Repudiation – Introduction to Plain Text, Cipher Text,
Encryption and Decryption Techniques, Secure Key,
Hashing, Digital signature
2 SYMMETRIC ENCRYPTION
Block cipher, Stream cipher - Data Encryption Standard
(DES) - Cipher Block Chaining (CBC) - Multiple 4 1,9
Encryption DES - International Data Encryption
Algorithm (IDEA) - Advanced Encryption Standard (AES)
3 ASYMMETRIC ENCRYPTION
Asymmetric key generation techniques – Applications of
4 1,9
asymmetric encryption methods – RSA- Elliptic Curve
Cryptography – Homomorphic encryption
4 DIGITAL SIGNATURES
Digital signature standards - Secure One-time Signatures -
3 1,9
Application of Digital Signatures - Diffie-Hellman Key
Exchange - Elliptic Curve Digital Signature algorithm
5 HASHING AND MESSAGE DIGESTS
Cryptographic Hash Functions- Applications- Simple hash
functions and features for ensuring security - Hash 4 9
functions based on Cipher Block Chaining- Secure Hash
Algorithm (SHA) - Message Digest - MD5
6 MESSAGE AUTHENTICATION
Authentication Systems – Password and Address - Security
Handshake Drawbacks - Authentication Standards –
5 9
Kerberos- PKI Trust Models -Message Authentication
Codes (MAC) – Security features- MAC based on Hash
Functions - MAC based on Block Ciphers
7 APPLICATIONS OF CRYPTOGRAPHIC
ALGORITHMS
Applying cryptography algorithms - Smart cards-Mobile
4 18
phone security - Electronic passports and ID cards -
SDA/DDA/CDA Bank Cards - Financial Cryptography –
Secure Payment Systems - Crypto currencies - Bitcoin
8 Contemporary Issues (To be handled by experts from
2 18
industry)
Lab (Indicative List of Experiments)
1. Demonstration of symmetric conventional
cryptographic techniques
2. Demonstration of symmetric classic cryptographic
techniques
3. Demonstration of asymmetric cryptographic techniques
4. Demonstration of hashing and message digest
techniques
5. Design and implementation of homomorphic encryption 14
techniques
6. Demonstration and implementation of secure
communication using standard crypto libraries
7. Implementation of smart card based server/client
applications
8. Demonstration of authentication techniques
9. Developing cryptographic algorithms for industrial
applications
10. Developing cryptographic algorithms for
innovative applications
Project 60 [Non
# Generally a team project [5 to 10 members] Contact]
# Concepts studied should have been used
# Down to earth application and innovative idea should
have been attempted
# Report in Digital format with all drawings using
software package to be submitted.
# Assessment on a continuous basis with a min of 3
reviews.
Sample Projects
Reference Books
1. D. R. Stinson, Cryptography: Theory and Practice, 3rd Ed. Boca Raton, FL: Chapman
& Hall/CRC, 2005. (ISBN No.: 978-1-58-488508-5)
2. W. Stallings, Cryptography and Network Security: Principles and Practice, 7th Ed.
Pearson Publishers, 2017. (ISBN No.: 978-0-13-44446-11)
3. J. H. Silverman, A Friendly Introduction to Number Theory, 4th Ed. Boston: Pearson,
2012. (ISBN No.: 978-0-321-81619-1)
4. C. Kaufman, R. Perlman, and M. Speciner, Network Security: Private Communication
in a Public World, 2nd Ed. United States: Prentice Hall PTR, 2002. (ISBN No.: 978-0-
13-046019-6)
Knowledge Areas that contain topics and learning outcomes covered in the course
Total hours
Where does the course fit in the curriculum?
This course is a
Core Course
Suitable from 2nd semester onwards
Programming knowledge in C/ Java