0% found this document useful (0 votes)
104 views1 page

Cryptography Syllabus

Uploaded by

Manasa S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
104 views1 page

Cryptography Syllabus

Uploaded by

Manasa S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

VISVESVARAYA TECHNOLOGICAL UNIVERSITY BELAGAVI

PhD Coursework Courses-2020 (ELECTRONICS & COMMUNICATION)


As per the regulation 2020

Group no. 3 Subject Code 20ECS243 Exam Duration 03 Hours


Exam Marks 100
Subject Title Cryptography and Network Security

Module-01
Foundations: Terminology, Steganography, substitution ciphers and transpositions ciphers, Simple
XOR, One-Time Pads, Computer Algorithms (Text 2: Chapter 1: Section 1.1 to 1.6).
SYMMETRIC CIPHERS: Traditional Block Cipher structure, Data encryption standard (DES), The
AES Cipher. (Text 1: Chapter 2: Section2.1, 2.2, Chapter 4).

Module-02
Introduction to modular arithmetic, Prime Numbers, Fermat’s and Euler’s theorem, primality
testing, Chinese Remainder theorem, discrete logarithm. (Text 1: Chapter 7: Section 1, 2, 3, 4, 5).
Principles of Public-Key Cryptosystems, The RSA algorithm, Diffie - Hellman Key Exchange, Elliptic
Curve Arithmetic, Elliptic Curve Cryptography (Text 1: Chapter 8, Chapter 9: Section 9.1, 9.3, 9.4).

Module-03
Pseudo-Random-Sequence Generators and Stream Ciphers: Linear Congruential Generators,
Linear Feedback Shift Registers, Design and analysis of stream ciphers, Stream ciphers using LFSRs,
A5, Hughes XPD/KPD, Nanoteq, Rambutan, Additive generators, Gifford, Algorithm M, PKZIP (Text
2: Chapter 16).

Module-04
One-Way Hash Functions: Background, Snefru, N-Hash, MD4, MD5, Secure Hash Algorithm [SHA],
One way hash functions using symmetric block algorithms, Using public key algorithms, Choosing a
one-way hash functions, Message Authentication Codes. Digital Signature Algorithm, Discrete
Logarithm Signature Scheme (Text 2: Chapter 18: Section 18.1 to 18.5, 18.7, 18.11 to 18.14 and
Chapter 20: Section 20.1, 20.4).

Module-05
E-mail Security: Pretty Good Privacy-S/MIME (Text 1: Chapter 17: Section 17.1, 17.2).
IP Security: IP Security Overview, IP Security Policy, Encapsulation Security Payload (ESP),
Combining security Associations. (Text 1: Chapter 18: Section 18.1 to 18.4).
Web Security: Web Security Considerations, SSL (Text 1: Chapter 15: Section 15.1, 15.2).

Textbooks:
1. ‘Cryptography and Network Security Principles and Practice’, William Stallings, Pearson
Education Inc., ISBN: 978-93325-1877-3, 6th Edition, 2014
2. ‘Applied Cryptography Protocols, Algorithms, and Source code in C’, Bruce Schneier, Wiley
Publications ISBN: 9971-51348-X, 2nd Edition
Reference Books:
1. ‘Cryptography and Network Security’, Behrouz A. Forouzan, TMH, 2007
2. ‘Cryptography and Network Security’, Atul Kahate, TMH, 2003

You might also like