Introduction to Cryptography
0%
Course Title: Introduction to Cryptography
Course No: CSIT.321
Nature of the Course: Theory + Lab
Semester: 6
Full Marks: 60 + 20 + 20
Pass Marks: 24 + 10 + 10
Credit Hours: 3
Course Description
Course Objectives
Course Contents
1.1. Cryptography Fundamentals
- Defining Cryptography and Cryptanalysis
- Security Attacks
- Security Services
- Security Mechanisms
1.2. Threats and Cipher Models
- Virus
- Worms
- Torjan Horse
- Types of Crypto Systems and their comparison
- Symmetric cipher model
1.3. Substitution Techniques
- Caeser cipher
- Monoalphabetic cipher
- Playfair cipher
- Hill cipher
- Polyalphabetic ciphers
- One-time pad
1.4. Transposition and Stream Concepts
- Transposition Techniques
- Steganography
- Overview of Shannon's Theory
- Block ciphers vs Stream Ciphers
2.1. DES
- Block Cipher Principles
- Data Encryption Standards
- Strength of DES
2.2. Finite Fields
- Groups Rings, Fields
- Modular Arithmetic
- Euclidean Algorithm
- Galois Fields (GF(p) & GF(2n))
- Polynomial Arithmetic
2.3. AES
- AES (Advanced Encryption Standards) Cipher
- AES Evaluation
2.4. Multiple DES and Stream Ciphers
- Double DES
- Triple DES
- Stream Cipher Structure
- RC4 Algorithm
3. Asymmetric Ciphers
10 hrs
3.1. Number Theory
- Prime Numbers
- Fermats Theorem
- Euler Theorem
- Primility Testing
- Chinese Remainder Theorem
- Discrete Logarithms
3.2. Public Key Cryptosystems
- Public Key Cryptosystems
- Applications of Public Key Cryptosystems
- Requirements of Public Key Cryptosystems
- Public Key Cryptanalysis
3.3. RSA
- RSA Algorithm
- Computational aspects of RSA
- Security of RSA
3.4. Key Exchange and Elliptic Curve
- Distribution of public key
- Distribution of secret key by using public key cryptography
- Diffie-Helman Key Exchange and Man-in-the-Middle Attack
- Elliptic Curve Arithmetic
- Elliptic Curve Cryptography
- The ElGamal Encryption Algorithm
4. Hashing
6 hrs
4.1. Authentication and MACs
- Authentication Requirements
- Authentication Functions
- Message Authentication Codes
4.2. Hash Functions
- Hash Functions and Birthday Attacks
- Security of Hash Functions and MACs
- Message Digests (MD5)
4.3. SHA and HMAC
- Secure Hash Algorithm (SHA-512)
- HMAC
- Security of HMAC
- CMAC
5.1. Digital Signatures
- Direct Digital Signatures
- Arbitrated Digital Signature
5.2. Authentication Protocols
- Mutual Authentication
- One-way Authentication
5.3. Digital Signature Standard
- The DSS Approach
- Digital Signature Algorithm
6. Network Security
6 hrs
6.1. Authentication Applications
- Kerberos
- Public Key Infrastructure
6.2. Email Security
- Pretty Good Privacy (Description, Keys, Key Management)
6.3. IP and Web Security
- IP Security
- Web Security
- Secure Socket Layer
- Transport Layer Security
- Secure Electronic Transaction
- Dual Signature
- Payment Processing
6.4. Intrusion Detection and Firewalls
- Intruders
- Statistical Anomaly Detection
- Rule Based Intruder Detection
- Password Protection
- Password Selection
- Firewalls
Laboratory Works
- 1.Cryptographic Algorithms Implementation
Text Books
- 1.W. Stallings, "Cryptography and Network Security", Pearson Education.
Reference Books
- 1.Douglas Stinson, "Cryptography Theory and Practice", 2nd Edition, Chapman & Hall/CRC.
- 2.B. A. Forouzan, "Cryptography & Network Security", Tata Mc Graw Hill.