Cryptography Syllabus
Cryptography Syllabus
Module-01
Foundations: Terminology, Steganography, substitution ciphers and transpositions ciphers, Simple
XOR, One-Time Pads, Computer Algorithms (Text 2: Chapter 1: Section 1.1 to 1.6).
SYMMETRIC CIPHERS: Traditional Block Cipher structure, Data encryption standard (DES), The
AES Cipher. (Text 1: Chapter 2: Section2.1, 2.2, Chapter 4).
Module-02
Introduction to modular arithmetic, Prime Numbers, Fermat’s and Euler’s theorem, primality
testing, Chinese Remainder theorem, discrete logarithm. (Text 1: Chapter 7: Section 1, 2, 3, 4, 5).
Principles of Public-Key Cryptosystems, The RSA algorithm, Diffie - Hellman Key Exchange, Elliptic
Curve Arithmetic, Elliptic Curve Cryptography (Text 1: Chapter 8, Chapter 9: Section 9.1, 9.3, 9.4).
Module-03
Pseudo-Random-Sequence Generators and Stream Ciphers: Linear Congruential Generators,
Linear Feedback Shift Registers, Design and analysis of stream ciphers, Stream ciphers using LFSRs,
A5, Hughes XPD/KPD, Nanoteq, Rambutan, Additive generators, Gifford, Algorithm M, PKZIP (Text
2: Chapter 16).
Module-04
One-Way Hash Functions: Background, Snefru, N-Hash, MD4, MD5, Secure Hash Algorithm [SHA],
One way hash functions using symmetric block algorithms, Using public key algorithms, Choosing a
one-way hash functions, Message Authentication Codes. Digital Signature Algorithm, Discrete
Logarithm Signature Scheme (Text 2: Chapter 18: Section 18.1 to 18.5, 18.7, 18.11 to 18.14 and
Chapter 20: Section 20.1, 20.4).
Module-05
E-mail Security: Pretty Good Privacy-S/MIME (Text 1: Chapter 17: Section 17.1, 17.2).
IP Security: IP Security Overview, IP Security Policy, Encapsulation Security Payload (ESP),
Combining security Associations. (Text 1: Chapter 18: Section 18.1 to 18.4).
Web Security: Web Security Considerations, SSL (Text 1: Chapter 15: Section 15.1, 15.2).
Textbooks:
1. ‘Cryptography and Network Security Principles and Practice’, William Stallings, Pearson
Education Inc., ISBN: 978-93325-1877-3, 6th Edition, 2014
2. ‘Applied Cryptography Protocols, Algorithms, and Source code in C’, Bruce Schneier, Wiley
Publications ISBN: 9971-51348-X, 2nd Edition
Reference Books:
1. ‘Cryptography and Network Security’, Behrouz A. Forouzan, TMH, 2007
2. ‘Cryptography and Network Security’, Atul Kahate, TMH, 2003