Cryptography
0%
Course Title: Cryptography
Course No: CSC327
Nature of the Course: Theory + Lab
Semester: 5
Full Marks: 60 + 20 + 20
Pass Marks: 24 + 8 + 8
Credit Hours: 3
Course Description
Course Objectives
Course Contents
1.1. Security Fundamentals
- Security: Computer Security, Information Security, Network Security, CIA Triad
- Cryptography, Cryptosystem, Cryptanalysis
- Security Threats and Attacks
- Security Services
- Security Mechanisms
1.2. Classical Cryptosystems
- Substitution Techniques: Ceasar, Monoalphabetic, Playfair, Hill, Polyalphabetic ciphers, One-time pad
- Transposition Techniques: Rail Fence Cipher
1.3. Modern Ciphers
- Block vs. Stream Ciphers
- Symmetric vs. Asymmetric Ciphers
2. Symmetric Ciphers
10 hrs
2.1. Cipher Structures and Standards
- Fiestel Cipher Structure
- Substitution Permutation Network (SPN)
- Data Encryption Standards (DES), Double DES, Triple DES
2.2. Finite Fields
- Groups Rings, Fields
- Modular Arithmetic
- Euclidean Algorithm
- Galois Fields (GF(p) & GF(2n))
- Polynomial Arithmetic
2.3. Advanced Encryption
- International Data Encryption Standard (IDEA)
- Advanced Encryption Standards (AES) Cipher
- Modes of Block Cipher Encryptions (Electronic Code Book, Cipher Block Chaining, Cipher Feedback Mode, Output Feedback Mode, Counter Mode)
3.1. Number Theory
- Prime Numbers
- Fermat's Theorem, Euler's Theorem
- Primility Testing, Miller-Rabin Algorithm
- Extended Euclidean Theorem
- Discrete Logarithms
3.2. Public Key Cryptosystems
- Public Key Cryptosystems, Applications of Public Key Cryptosystems
- Distribution of public key, Distribution of secret key by using public key cryptography
- Diffie-Helman Key Exchange, Man-in-the-Middle Attack
- RSA Algorithm
- Elgamal Cryptographic System
4.1. Message Authentication and Hash Functions
- Message Authentication, Message Authentication Functions, Message Authentication Codes
- Hash Functions, Properties of Hash functions, Applications of Hash Functions
- Message Digests: MD4 and MD5
- Secure Hash Algorithms: SHA-1 and SHA-2
4.2. Digital Signatures
- Digital Signatures: Direct Digital Signatures, Arbitrated Digital Signature
- Digital Signature Standard: The DSS Approach, Digital Signature Algorithm
- Digital Signature Standard: The RSA Approach
5. Authentication
3 hrs
5.1. Authentication Systems
- Authentication System
- Password Based Authentication, Dictionary Attacks
- Challenge Response System
- Biometric System
- Needham-Schroeder Scheme, Kerberos Protocol
6.1. PKI and Certificates
- Overview of Network Security
- Digital Certificates and X.509 certificates, Certificate Life Cycle Management
- PKI trust models, PKIX
6.2. Security Protocols
- Email Security: Pretty Good Privacy (PGP)
- Secure Socket Layer (SSL) and Transport Layer Security (TLS)
- IP Security (IPSec)
- Firewalls and their types
7. Malicious Logic
3 hrs
7.1. Malicious Logic and Intrusion
- Malicious Logic, Types of Malicious Logic: Virus, Worm, Trojan Horse, Zombies, Denial of Service Attacks
- Intrusion, Intruders and their types, Intrusion Detection System
Laboratory Works
- 1.Cryptographic Algorithms Implementation
Text Books
- 1.Cryptography and Network Security, W. Stallings, Pearson Education
Reference Books
- 1.Network Security, Principles and Practice, William Stallings
- 2.Computer Security, Art and Science, Matt Bishop
- 3.Information Security: Principles and Practices, Mark Stamp
- 4.Applied Cryptography, Bruce Schneier
- 5.Cryptography: Theory and Practice, Douglas. R. Stinson
- 6.Cryptography & Network Security, B. A. Forouzan, Tata Mc Graw Hill