Annexure
‘CD – 01’
FORMAT FOR COURSE CURRICULUM
Course Title: Applied Cryptography L T P/S SW/F TOTAL
Credit Units:4 W CREDIT
UNITS
3 - 2 - 4
Course Level:UG
Course Code:
Course Objectives: The aim of this course is to introduce the student to the areas of cryptography and cryptanalysis. This course develops a basic
understanding of the algorithms used to protect users online and to understand some of the design choices behind these algorithms. To develop a workable
knowledge of the mathematics used in cryptology in this course. The course deals with modern trends in asymmetric key cryptography, namely using Elliptic
Curves. The course concludes with the design rationale of network protocols for key exchange and attacks on such protocols.
Pre-requisites: Computer Networks, Basic Mathematics
Course Contents/Syllabus:
Weightage (%)
Module I Introduction and Mathematical Foundations 20%
Descriptors/Topics
Overview on Modern Cryptography, Number Theory, Probability and Information Theory, Classical Cryptosystems,
Cryptanalysis of Classical Cryptosystems, Shannon’s Theory
Module II Symmetric Key Ciphers 20%
Descriptors/Topics
Symmetric Key Ciphers, Modern Block Ciphers (DES),AES, Linear Cryptanalysis, Differential Cryptanalysis. ,Other Cryptanalysis
techniques, Overview on S-Box Design Principles, Modes of operation of Block Ciphers, Stream Ciphers
Module III Hash Functions and MACs 20%
Descriptors/Topics
Hash functions: The Merkle Damgard Construction, Message Authentication Codes (MACs), Asymmetric Key Ciphers: More
Number Theoretic Results, The RSA Cryptosystem, Primality Testing, Factoring Algorithms
Module IV Digital Signatures 20%
Descriptors/Topics The Discrete Logarithm Problem (DLP) and the Diffie Hellman Key Exchange algorithm, Signature schemes,
Elliptic curve based cryptography
Module V Network Security 20%
Descriptors/Topics Secret Sharing Schemes, Kerberos, PGP, Intruders, Firewalls, Viruses
Student Learning Outcomes:
• Enable the students to learn fundamental concepts of cryptography.
• Enable students to learn about symmetric and asymmetric cryptography
• To learn about Hash Tables and Message authentication codes
• To learn various algorithms of digital signature ,cryptography and network security
• To learn fundamental concepts of network security
Pedagogy for Course Delivery:
Lectures, Lab, NPTEL Videos
Lab/ Practicals details, if applicable:
List of Experiments:
• Monoalphabetical ciphers Caeser cipher Cryptanlysis, Frequency analysis
• Introduction to OpenSSL Introduction to Federal Information Processing Standards (FIPs)
• Symmetric Key Cryptography Pseudo random number generation DES key creation Encryption and decryption with DES File integrity with MD5 hash
• Symmetric Key Distribution With NetCat With Apache Key compromise by protocol analyzer (Wireshark)
• Message Authentication Codes
• Digital Signature generation
• Password Auditing/Cracking
• Intrusion Detection
• Stegnography
• Open ended
Assessment/ Examination Scheme:
Theory L/T (%) Lab/Practical/Studio (%) Total
75% 25% 100
Theory Assessment (L&T):
Continuous Assessment/Internal Assessment(40 %) End Term
Examination (60%)
Components (Drop Attendance Class Test Assignment Case Study
down)
Weightage (%) 5 10 7 8 60
Lab Assessment
Continuous Assessment/Internal Assessment(40%) End Term
Examination (60%)
Components (Drop Attendance Lab Record Performance viva
down)
Weightage (%) 5 10 15 10 60
Text Reading:
• Douglas Stinson, "Cryptography Theory and Practice", 2 nd Edition, Chapman & Hall/CRC.
• W. Stallings, "Cryptography and Network Security", Pearson Education.
•
References:
• B. A. Forouzan, "Cryptography & Network Security", Tata Mc Graw Hill.
•
•
Additional Reading:
• Wenbo Mao, "Modern Cryptography, Theory & Practice", Pearson Education.
• Hoffstein, Pipher, Silvermman, "An Introduction to Mathematical Cryptography", Springer.
• J. Daemen, V. Rijmen, "The Design of Rijndael", Springer.
• A. Joux,"Algorithmic Cryptanalysis", CRC Press.
• S. G. Telang, "Number Theory", Tata Mc Graw Hill.
• C. Boyd, A. Mathuria, "Protocols for Authentication and Key Establishment", Springer.
• Matt Bishop, "Computer Security", Pearson Education.
Any other Study Material:
• https://nptel.ac.in/syllabus/106105031/