Bachelors Level/Third Year/Fifth Semester/Science csit/fifth semester/cryptography/syllabus

B.Sc Computer Science and Information Technology

Institute of Science and Technology, TU

Nature of the course: (Theory+Lab)

F.M: 60+20+20 P.M: 24+8+8

Credit Hrs: 3Hrs

Cryptography [CSC327]
Course Objective
i.
The objectives of this course are to familiarize the students with cryptography and its applications. The students will be able to develop basic understanding of cryptographic mechanisms.
Course Description

The course introduces the underlying the principles and design of cryptosystems. The course covers the basics concepts of cryptography including: traditional ciphers, block ciphers, stream ciphers, public and private key cryptosystems. The course also includes the theory of hash functions, authentication systems, network security protocols and malicious logic

S1:Introduction and Classical Ciphers[7]
1
Security: Computer Security, Information Security, Network Security, CIA Triad, Cryptography, Cryptosystem, Cryptanalysis, Security Threats and Attacks, Security Services, Security Mechanisms
2
Classical Cryptosystems: Substitution Techniques: Ceasar, Monoalphabetic, Playfair, Hill, Polyalphabetic ciphers, One-time pad Transposition Techniques: Rail Fence Cipher
3
Modern Ciphers: Block vs. Stream Ciphers, Symmetric vs. Asymmetric Ciphers
S2:Symmetric Ciphers[10]
1
Fiestel Cipher Structure, Substitution Permutation Network (SPN)
2
Data Encryption Standards (DES), Double DES, Triple DES
3
Finite Fields: Groups Rings, Fields, Modular Arithmetic, Euclidean Algorithm, Galois Fields (GF(p) & GF(2n )), Polynomial Arithmetic
4
International Data Encryption Standard (IDEA)
5
Advanced Encryption Standards (AES) Cipher
6
Modes of Block Cipher Encryptions (Electronic Code Book, Cipher Block Chaining, Cipher Feedback Mode, Output Feedback Mode, Counter Mode)
S3:Asymmetric Ciphers[8]
1
Number Theory: Prime Numbers, Fermat’s Theorem, Euler’s Theorem, Primility Testing, Miller-Rabin Algorithm, Extended Euclidean Theorem, Discrete Logarithms
2
Public Key Cryptosystems, Applications of Public Key Cryptosystems
3
Distribution of public key, Distribution of secret key by using public key cryptography, DiffieHelman Key Exchange, Man-in-the-Middle Attack
4
RSA Algorithm, Elgamal Cryptographic System
S4:Cryptographic Hash Functions and Digital Signatures[8]
1
Message Authentication, Message Authentication Functions, Message Authentication Codes
2
Hash Functions, Properties of Hash functions, Applications of Hash Functions
3
Message Digests: MD4 and MD5
4
Secure Hash Algorithms: SHA-1 and SHA-2
5
Digital Signatures: Direct Digital Signatures, Arbitrated Digital Signature
6
Digital Signature Standard: The DSS Approach, Digital Signature Algorithm
7
Digital Signature Standard: The RSA Approach
S5:Authentication[3]
1
Authentication System
2
Password Based Authentication, Dictionary Attacks,
3
Challenge Response System,
4
Biometric System
5
Needham-Schroeder Scheme, Kerberos Protocol
S6:Network Security and Public Key Infrastructure[6]
1
Overview of Network Security
2
Digital Certificates and X.509 certificates, Certificate Life Cycle Management
3
PKI trust models, PKIX
4
Email Security: Pretty Good Privacy (PGP)
5
Secure Socket Layer (SSL) and Transport Layer Security (TLS)
6
IP Security (IPSec)
7
Firewalls and their types
S7:Malicious Logic[3]
1
Malicious Logic, Types of Malicious Logic: Virus, Worm, Trojan Horse, Zombies, Denial of Service Attacks,
2
Intrusion, Intruders and their types, Intrusion Detection System
References
1.
W. Stallings, Cryptography and Network Security, Pearson Education
2.
William Stallings, Network Security, Principles and Practice
3.
Matt Bishop, Computer Security, Art and Science
4.
Mark Stamp, Information Security: Principles and Practices
5.
Bruce Schneier, Applied Cryptography
6.
Douglas. R. Stinson. Cryptography: Theory and Practice
7.
B. A. Forouzan, Cryptography & Network Security, Tata Mc Graw Hill
Labrotary Work
The laboratory work includes implementing and simulating the concepts of cryptographic algorithms, hash functions, digital signatures, network security protocols and malicious logic. Students are free to use any of the language and platform as per the skills