KEMBAR78
Crypt Analysis Handout | PDF | Cryptography | Encryption
0% found this document useful (0 votes)
63 views24 pages

Crypt Analysis Handout

The document is a course handout for 'Crypt Analysis and Cyber Defence' at K L Deemed to be University for the 2025-2026 academic year. It outlines the course structure, objectives, syllabus, and outcomes, focusing on cryptographic principles, techniques, and their applications in network security. The document also includes references, textbooks, and a detailed teaching plan for the course.

Uploaded by

p89068112
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views24 pages

Crypt Analysis Handout

The document is a course handout for 'Crypt Analysis and Cyber Defence' at K L Deemed to be University for the 2025-2026 academic year. It outlines the course structure, objectives, syllabus, and outcomes, focusing on cryptographic principles, techniques, and their applications in network security. The document also includes references, textbooks, and a detailed teaching plan for the course.

Uploaded by

p89068112
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

7/18/25, 9:33 AM about:blank

K L Deemed to be University
CSE-1 -- KLVZA
Course Handout
2025-2026, Odd Sem
Course Title :CRYPT ANALYSIS AND CYBER DEFENCE
Course Code :23CS2224F
L-T-P-S Structure : 2-0-2-0
Pre-requisite :
Credits :3
Course Coordinator :Ruth Ramya Kalangi
Team of Instructors :
Teaching Associates :
Syllabus :Introduction to Security: Security Concepts, Security Attacks, A Security Model, Security ,
Services and Mechanisms, Antivirus bypassing, Password Attacks and Web browser exploitation. Block
Ciphers: DES, DES Example, Strength of DES, Differential and Linear Cryptanalysis., AES: Finite Field
Arithmetic, AES Structure, AES Transformation Functions, AES Example. Multiple Encryption and Triple
DES. Modes of Operation. Pseudorandom Number Generation: Principles and Pseudorandom Number,
Generators, Pseudorandom Number Generation using a Block Cipher, Stream Ciphers. Stream Ciphers:
RC4. Public-key Cryptography: RSA algorithm, Diffie-Hellman Key Exchange, ElGamal Cryptosystem,
Elliptic Curve Arithmetic, Elliptic Curve Cryptography. Cryptographic. Hash Functions: Applications of
Cryptographic Hash functions, Two Simple Hash Functions, Requirements and Security, SHA 512, MD5..
Text Books :1. Cryptography and Network Security Principles and Practice, William stallings, 5th Edition,
Pearson, 2011. 2. Applied Cryptography: Protocols, Algorthms, and Source Code in C, Bruce Schneier, John
Wiley & Sons, Second Edition, 1996. 3. Cyber Security Incident Management Guide, Gerard Johansen,
Packt Publishing Ltd, 2017.
Reference Books :1. Applied Cryptography for Cyber Security and Defense: Information Encryption and
Cyphering, Hamid R. Nemati and Li Yang, IGI Global, 2011. 2. Cryptography and Network Security ,
Forouzon B, Indian Edition, TMH (2012).
Web Links :1. https://www.linkedin.com/learning/symmetric-cryptography-essential-training-
24667819/cryptography-is-everywhere 2. https://www.linkedin.com/learning/symmetric-cryptography-
essential-training-24667819 3. https://www.hacker101.com/
MOOCS :1. https://www.coursera.org/specializations/intro-cyber-security 2.
https://www.eccouncil.org/cybersecurity-exchange/cyber-novice/free-cybersecurity-courses-beginners/ 3.
https://www.edx.org/learn/cybersecurity/ibm-cybersecurity-basics-tools-and-cyberattacks 4.
https://www.coursera.org/specializations/cybersecurity-fundamentals 5.
https://www.coursera.org/learn/cybersecurity-architecture
Course Rationale :This course introduces the fundamental principles of cryptography and its applications
on the network security domain. Students will become familiar with cryptographic techniques for secured
communication over an unsecured channel; verification of the authenticity of the source of a message;
verification of the integrity of the messages transmitted via an unsecured channel and unique identification
of the originator of any message. Cryptanalysis attacks against the cryptographic techniques, and attack
models will be presented. Furthermore, it will be illustrated on how network security and management
mechanisms employ cryptography to prevent, detect, and mitigate security threats against the network.
Course Objectives :The course aims to provide a comprehensive understanding of the fundamental
principles of cryptography, including encryption, decryption, key management, and authentication. This
course also covers various cryptographic algorithms such as symmetric key algorithms (e.g., AES, DES),
asymmetric key algorithms (e.g., RSA, ECC), and hash functions (e.g., SHA-256). The objective is to
understand the strengths, weaknesses, and applications of different algorithms. Vulnerabilities of

about:blank 1/24
7/18/25, 9:33 AM about:blank

cryptographic systems and defense mechanisms and countermeasures to mitigate these attacks are also
analyzed in this course.
Global Certifications :1.https://learningportal.juniper.net/juniper/user_activity_info.aspx?id=EDU-JUN-
WBT-JOL-JNCIA-JUNOS
Industry Specific Tools :https://www.python.org/downloads/release/python-3110/
Sector Skill Council
:1.https://nsdcindia.org/sites/default/files/MC_SSCQ8309_CC_Cloud%20Security%20Analyst_V1.0_17.11
.2020.pdf

COURSE OUTCOMES (COs):

Blooms
CO Taxonomy
Course Outcome (CO) PO/PSO
NO Level
(BTL)
Apply Classical Encryption Techniques and Symmetric
CO1 Encryption algorithms to convert a given Plaintext to Cipher PSO2,PO1,PO2 3
text.
Apply RC4, Block Cipher Modes of Operation and Multiple
CO2 PSO2,PO1,PO2 3
Encryption for given plaintext.
Apply Public key Crypto Systems to ensure Secure
CO3 PSO2,PO1,PO2 3
communication of data.
Apply Hash, MAC algorithms and Digital Signatures to achieve
CO4 PSO2,PO1,PO2 3
Message Authentication and Integrity.
Implement security goals like Confidentiality, Integrity,
CO5 PSO2,PO1,PO3 3
Authentication algorithms.

COURSE OUTCOME INDICATORS (COIs)::

Outcome Highest
COI-2 COI-3
No. BTL
Btl-3
Btl-2
Apply Classical Encryption Techniques
CO1 3 Compare and Contrast Passive and Active
and DES algorithm with suitable examples
Attacks
and interpret attacks on them
Btl-2
Btl-3
CO2 3 Summarize block cipher modes of
Apply RC4 algorithm for a given plaintext.
operation & multiple encryption
Btl-3
Btl-2 Apply RSA, Diffie-Hellman, Elgamal,
CO3 3
Illustrate Public Key Cryptosystems Elliptic Curve Arithmetic and
Cryptography to ensure data security.
Btl-3
Btl-2
Apply two Simple Hash Functions and
CO4 3 Understand Hash Functions & MAC and
SHA 512 and MAC algorithms for a given
their applications
message
Btl-2 Btl-3
CO5 3 Understand various encryption and hash Apply Encryption algorithms and hash
algorithms algorithms on a given plaintext

PROGRAM OUTCOMES & PROGRAM SPECIFIC OUTCOMES (POs/PSOs)

about:blank 2/24
7/18/25, 9:33 AM about:blank

Po
Program Outcome
No.
PSO2 An Ability to gain working Knowledge on emerging software tools and technologies.
Engineering Knowledge:Apply the knowledge of mathematics, science, engineering fundamentals,
PO1
and an engineering specialization to the solution of complex engineering problems.
Problem Analysis: Identify, formulate, review research literature, and analyse complex engineering
PO2 problems reaching substantiated conclusions using first principles of mathematics, natural sciences
and engineering sciences
Design/Development of Solutions: Design solutions for complex engineering problems and design
PO3 system components or processes that meet the specified needs with appropriate consideration for the
public health and safety, and the cultural, societal, and environmental considerations

Lecture Course DELIVERY Plan:


Book
No[CH Teaching-Learning
Sess.No. CO COI Topic EvaluationComponents
No][Page Methods
No]

COI- Course Handout, T1, CH 1, End Semester


1 CO1 Chalk,LTC,PPT,Talk
2 Introduction to Security Pg,{8,9] Exam,SEM-EXAM1

Security Attacks, T1, CH 1,


COI- Services, Mechanisms Pg {8,9] & End Semester
2 CO1 Chalk,PPT,Talk
2 and Model for Network T1, CH [1, Exam,SEM-EXAM1
Security Pg {15-25]

COI- Substitution & T1, CH [2], End Semester


3 CO1 Chalk,PPT,Talk
3 Transposition Technique Pg [33-53] Exam,SEM-EXAM1

COI- T1, CH [3], End Semester


4 CO1 SDES Algorithm Chalk,PPT,Talk
3 Pg [66- 88] Exam,SEM-EXAM1

COI- DES Algorithms & T1, CH [3], End Semester


5 CO5 Chalk,PPT,Talk
2 Attacks Pg [68-89] Exam,SEM-EXAM1

ALM,End Semester
T1, CH [5],
COI- SAES & AES Exam,Home
6 CO1 Pg [148- Chalk,PPT,Talk
3 Algorithms Assignment,SEM-
174]
EXAM1

Block Cipher Design


COI- T1, CH [6], End Semester
7 CO2 Principles & Multiple Chalk,PPT,Talk
2 Pg [193] Exam,SEM-EXAM1
Encryption

T1, CH [6],
COI- Block Cipher Modes of End Semester
8 CO2 Pg [198- Chalk,PPT,Talk
2 Operation Exam,SEM-EXAM1
201]

T1, CH [6],
COI- Block Cipher Modes of End Semester
9 CO2 Pg [201- Chalk,PPT,Talk
2 Operation Exam,SEM-EXAM1
206]

10 CO2 COI- Random Number T1, CH [7], Chalk,PPT,Talk End Semester

about:blank 3/24
7/18/25, 9:33 AM about:blank

Book
No[CH Teaching-Learning
Sess.No. CO COI Topic EvaluationComponents
No][Page Methods
No]
2 Generators Pg {219- Exam,SEM-EXAM1
226]

COI- Random Number T1, CH [7], End Semester


11 CO2 Chalk,PPT,Talk
3 Generators Pg [226] Exam,SEM-EXAM1

Pseudo random Number


COI- T1, CH [7], End Semester
12 CO2 Generators using Block Chalk,PPT,Talk
2 Pg. [229] Exam,SEM-EXAM1
Ciphers.

COI- T1, CH [7[, ALM,End Semester


13 CO2 Stream Ciphers & SRC4 Chalk,PPT,Talk
3 Pg,232] Exam,SEM-EXAM1

End Semester
COI- T1, CH [7], Exam,Home
14 CO2 RC4 Algorithm Chalk,PPT,Talk
2 Pg [234] Assignment,SEM-
EXAM1

COI- Public Key T1, CH End Semester


15 CO3 Chalk,PPT,Talk
2 Cryptography [269] Exam,SEM-EXAM2

T1, CH
COI- End Semester
16 CO3 RSA Algorithm [10], Pg. Chalk,PPT,Talk
3 Exam,SEM-EXAM2
[305]

T1, CH
COI- Diffie-Hellman Key End Semester
17 CO3 [10], PG. Chalk,PPT,Talk
3 Exchange Exam,SEM-EXAM2
[301]

T1, CH
COI- End Semester
18 CO3 Elgamal Algorithm [10], pg. Chalk,PPT,Talk
3 Exam,SEM-EXAM2
[305]

T1, CH
COI- Elliptic Curve ALM,End Semester
19 CO3 [10, pg. Chalk,PPT,Talk
3 Arithmetic Exam,SEM-EXAM2
[308]

End Semester
Elliptic Curve T1, CH
COI- Exam,Home
20 CO3 Arithmetic & [10, PG, Chalk,PPT,Talk
3 Assignment,SEM-
Cryptography [308-317]
EXAM2

T1, CH
COI- End Semester
21 CO4 Hash Functions [11], PG. Chalk,PPT,Talk
2 Exam,SEM-EXAM2
[329]

Two simple Hash


T1, CH
COI- functions & End Semester
22 CO4 [11], PG. Chalk,PPT,Talk
3 Cryptanalysis of Hash Exam,SEM-EXAM2
[333]
Functions
about:blank 4/24
7/18/25, 9:33 AM about:blank

Book
No[CH Teaching-Learning
Sess.No. CO COI Topic EvaluationComponents
No][Page Methods
No]

T1, CH
COI- End Semester
23 CO4 SHA-512 & MD5 [11], PG Chalk,PPT,Talk
3 Exam,SEM-EXAM2
[342]

T1, CH
COI- ALM,End Semester
24 CO4 MAC Uses [12], PG. Chalk,PPT,Talk
2 Exam,SEM-EXAM2
[362-372

End Semester
T1, CH
COI- HMAC, DAA &CMAC Exam,Home
25 CO5 [12], PG. Chalk,PPT,Talk
2 Algorithms Assignment,SEM-
[362-372]
EXAM2

Lecture Session wise Teaching – Learning Plan

SESSION NUMBER : 1

Session Outcome: 1 Defines Security Concepts

Session Outcome: 2 Demonstrates CIA Triangle

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
5 Attendance 1 Talk APPLICABLE
---
--- NOT
20 Course Handout 2 PPT APPLICABLE
---
--- NOT
20 Security Concepts & CIA Triangle 2 Chalk APPLICABLE
---
--- NOT
5 Summary 1 Talk APPLICABLE
---

SESSION NUMBER : 2

Session Outcome: 1 Define security attacks security services, security mechanisms

Session Outcome: 2 Demonstrate model for network security.

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
5 Attendance 1 Chalk APPLICABLE
---

about:blank 5/24
7/18/25, 9:33 AM about:blank

--- NOT
10 Security Attacks 2 Talk APPLICABLE
---
--- NOT
10 Security Services 2 PPT APPLICABLE
---
--- NOT
10 Security Mechanisms 2 PPT APPLICABLE
---
--- NOT
10 Model for Network Security 2 PPT APPLICABLE
---
--- NOT
5 Conclusion 2 Talk APPLICABLE
---

SESSION NUMBER : 3

Session Outcome: 1 Compare & Contrast substitution and transposition techniques.

Session Outcome: 2 Apply substitution and transposition techniques on a given plaintext.

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
5 Attendance 1 Talk APPLICABLE
---
--- NOT
20 Substitution Techniques 3 PPT APPLICABLE
---
--- NOT
20 Transposition Techniques 3 Chalk APPLICABLE
---
--- NOT
5 Summary 1 Talk APPLICABLE
---

SESSION NUMBER : 4

Session Outcome: 1 Demonstrate Symmetric Cipher Model

Session Outcome: 2 apply SDES algorithm to generate ciphertext

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
5 Attendance 1 Talk APPLICABLE
---
--- NOT
20 SDES Key Generation 3 Chalk APPLICABLE
---
20 SDES Encryption 3 PPT --- NOT
APPLICABLE
about:blank 6/24
7/18/25, 9:33 AM about:blank

---
--- NOT
5 Summary 1 Talk APPLICABLE
---

SESSION NUMBER : 5

Session Outcome: 1 Demonstrate DES Algorithm

Session Outcome: 2 Understand attacks on DES Algorithm

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
5 Attendance 1 Talk APPLICABLE
---
--- NOT
20 DES Key Generation 2 PPT APPLICABLE
---
--- NOT
20 DES Encryption 2 Chalk APPLICABLE
---
--- NOT
5 Summary 1 Talk APPLICABLE
---

SESSION NUMBER : 6

Session Outcome: 1 Apply SAES Algorithm to Generate Ciphertext

Session Outcome: 2 Demonstrate AES Algorithm

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
5 Attendance 1 Talk APPLICABLE
---
Problem-
20 SAES Algorithm 3 Chalk Based
Learning
--- NOT
20 AES Algorithm 2 PPT APPLICABLE
---
--- NOT
5 Summary 1 Talk APPLICABLE
---

SESSION NUMBER : 7

Session Outcome: 1 Summarize Block Cpher Design Principles

Session Outcome: 2 Illustrate Double DES & Triple DES Algorithms

about:blank 7/24
7/18/25, 9:33 AM about:blank

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
5 Attendance 1 Talk APPLICABLE
---
--- NOT
20 Block Cipher Design Principles 2 PPT APPLICABLE
---
--- NOT
20 Double DES & Triple DES 2 Chalk APPLICABLE
---
--- NOT
5 Summary 1 Talk APPLICABLE
---

SESSION NUMBER : 8

Session Outcome: 1 Summarize Block Cipher Design Principles

Session Outcome: 2 Illustrate Double DES & Triple DES Algorithms

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
5 Attendance 1 Talk APPLICABLE
---
--- NOT
20 Electronic Code Book 2 Chalk APPLICABLE
---
--- NOT
20 Cipher Block Chaining Mode 2 PPT APPLICABLE
---
--- NOT
5 Summary 1 Talk APPLICABLE
---

SESSION NUMBER : 9

Session Outcome: 1 Define Block Cipher

Session Outcome: 2 Demonstrate CFB, OFB & Counter Block Cipher Modes of Operation

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
5 Attendance 1 Talk APPLICABLE
---
--- NOT
20 Cipher Feedback Mode, Output Feedback Mode 2 PPT APPLICABLE
---
20 Counter Mode 2 Chalk --- NOT
APPLICABLE
about:blank 8/24
7/18/25, 9:33 AM about:blank

---
--- NOT
5 Summary 1 Talk APPLICABLE
---

SESSION NUMBER : 10

Session Outcome: 1 List Principles of Random Number Generation

Session Outcome: 2 Demonstrate types of Random Number Generators

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
5 Attendance 1 Talk APPLICABLE
---
--- NOT
20 Principles of Random Number Generation 2 PPT APPLICABLE
---
--- NOT
20 Types of Random Number Generation 2 Chalk APPLICABLE
---
--- NOT
5 Summary 1 Talk APPLICABLE
---

SESSION NUMBER : 11

Session Outcome: 1 Demonstrate types of Random Number Generators

Session Outcome: 2 Apply Psuedorandom Number Generators

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
5 Attendance 1 Talk APPLICABLE
---
--- NOT
20 LCG 3 PPT APPLICABLE
---
--- NOT
20 BBS 3 Chalk APPLICABLE
---
--- NOT
5 Summary 1 Talk APPLICABLE
---

SESSION NUMBER : 12

Session Outcome: 1 Demonstrate Psuedorandom Number Generators using Block Ciphers

Session Outcome: 2 Demonstrate X9.17 ANSI Ring

about:blank 9/24
7/18/25, 9:33 AM about:blank

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
5 Attendance 1 Talk APPLICABLE
---
--- NOT
20 Psuedorandom Number Generators using Block Ciphers. 2 PPT APPLICABLE
---
--- NOT
20 X9.17 ANSI Ring 2 Chalk APPLICABLE
---
--- NOT
5 Summary 1 Talk APPLICABLE
---

SESSION NUMBER : 13

Session Outcome: 1 Summarize the concepts of Stream Cipher.

Session Outcome: 2 Apply SRC4 cipher to a given plaintext.

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
5 Attendance 1 Talk APPLICABLE
---
One minute
20 Stream Ciphers 2 PPT
paper
--- NOT
20 SRC4 3 Chalk APPLICABLE
---
--- NOT
5 Summary 1 Talk APPLICABLE
---

SESSION NUMBER : 14

Session Outcome: 1 Demonstrate RC4 cipher to a given plaintext

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
5 Attendance 1 Talk APPLICABLE
---
--- NOT
20 RC4 Key Generation 2 Chalk APPLICABLE
---
--- NOT
20 RC4 Encryption 2 PPT APPLICABLE
---

about:blank 10/24
7/18/25, 9:33 AM about:blank

--- NOT
5 Summary 1 Talk APPLICABLE
---

SESSION NUMBER : 15

Session Outcome: 1 Define Public Key Cryptosystems

Session Outcome: 2 List out applications of Principles of Public Key Cryptosystems

Session Outcome: 3 Summarize Principles of Public Key Cryptosystems

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
5 Attendance 1 Talk APPLICABLE
---
--- NOT
10 Principles of Public key Crypto system 2 PPT APPLICABLE
---
--- NOT
10 Public key Cryptosystem -Confidentiality 2 Chalk APPLICABLE
---
--- NOT
10 Public key Cryptosystem -Authentication 2 PPT APPLICABLE
---
--- NOT
Public key Cryptosystem -Confidentiality &
10 2 PPT APPLICABLE
Authentication
---
--- NOT
5 Conclusion 1 Talk APPLICABLE
---

SESSION NUMBER : 16

Session Outcome: 1 Apply RSA Algorithm for a given value of plaintext

Session Outcome: 2 Summarize attacks on RSA Algorithm

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
5 Attendance 1 Talk APPLICABLE
---
--- NOT
20 RSA Algorithm 3 PPT APPLICABLE
---
--- NOT
20 Attacks on RSA 2 Chalk APPLICABLE
---
--- NOT
5 Summary 1 Talk APPLICABLE
---
about:blank 11/24
7/18/25, 9:33 AM about:blank

SESSION NUMBER : 17

Session Outcome: 1 Apply Diffie-Hellman Key Exchange Algorithms on different plaintexts.

Session Outcome: 2 Summarize Man-in-the-Middle attack on Diffie-Hellman Algorithm

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
5 Attendance 1 Talk APPLICABLE
---
--- NOT
20 Diffie-Hellman Key Exchange Algorithm 3 PPT APPLICABLE
---
--- NOT
20 Man-in-the-Middle Attack 2 Chalk APPLICABLE
---
--- NOT
5 Summary 1 Talk APPLICABLE
---

SESSION NUMBER : 18

Session Outcome: 1 Apply Elgamal Algorithms to generate ciphertext.

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
5 Attendance 1 Talk APPLICABLE
---
--- NOT
20 Elgamal Algorithm 3 PPT APPLICABLE
---
--- NOT
20 Example on Elgamal Algorithm 3 Chalk APPLICABLE
---
--- NOT
5 Summary 1 Talk APPLICABLE
---

SESSION NUMBER : 19

Session Outcome: 1 Summarizes properties of Abelian Group

Session Outcome: 2 Differentiates Prime Curves and Binary Curves

Session Outcome: 3 Apply Elliptic Curve Arithmetic over Prime Curves

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods

about:blank 12/24
7/18/25, 9:33 AM about:blank

--- NOT
5 Attendance 1 Talk APPLICABLE
---
--- NOT
20 Abelian Group 2 PPT APPLICABLE
---
20 Elliptic Curve Arithmetic Over Prime Curves 3 Chalk Fish Bowl
--- NOT
5 Summary 1 Talk APPLICABLE
---

SESSION NUMBER : 20

Session Outcome: 1 Apply Elliptic Curve Arithmetic Binary Curves

Session Outcome: 2 Illustrates Elliptic Curve Diffie-Hellman Key Exchange Algorithm.

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
5 Attendance 1 Talk APPLICABLE
---
--- NOT
20 Elliptic Curve Arithmetic Binary Curves 3 Talk APPLICABLE
---
--- NOT
20 Elliptic Curve Cryptography 2 PPT APPLICABLE
---
--- NOT
5 Summary 1 Talk APPLICABLE
---

SESSION NUMBER : 21

Session Outcome: 1 Define Hash Functions

Session Outcome: 2 List Properties of Hash Functions

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
5 Attendance 1 Talk APPLICABLE
---
--- NOT
20 Hash Functions Introduction 2 PPT APPLICABLE
---
--- NOT
20 Properties of Hash Functions 2 Chalk APPLICABLE
---
--- NOT
5 Summary 1 Talk APPLICABLE
---

about:blank 13/24
7/18/25, 9:33 AM about:blank

SESSION NUMBER : 22

Session Outcome: 1 Apply simple Hash Functions

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
5 Attendance 1 Talk APPLICABLE
---
--- NOT
20 Hash Function 1 3 Chalk APPLICABLE
---
--- NOT
20 Hash Function 2 3 PPT APPLICABLE
---
--- NOT
5 Summary 1 Talk APPLICABLE
---

SESSION NUMBER : 23

Session Outcome: 1 Apply SHA-512 hash algorithm.

Session Outcome: 2 Demonstrate MD5 Hash Algorithm.

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
5 Attendance 1 Talk APPLICABLE
---
--- NOT
20 SHA-512 3 Chalk APPLICABLE
---
--- NOT
20 MD-5 2 PPT APPLICABLE
---
--- NOT
5 Summary 1 Talk APPLICABLE
---

SESSION NUMBER : 24

Session Outcome: 1 Summarize Applications of MAC

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
5 Attendance 1 Talk APPLICABLE
---
Video
20 Applications of MAC 2 Chalk
synthesis

about:blank 14/24
7/18/25, 9:33 AM about:blank

--- NOT
20 Uses of MAC 2 PPT APPLICABLE
---
--- NOT
5 Summary 1 Talk APPLICABLE
---

SESSION NUMBER : 25

Session Outcome: 1 Illustrate MAC algorithms

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
5 Attendance 1 Talk APPLICABLE
---
--- NOT
20 HMAC, CMAC Algorithms 2 PPT APPLICABLE
---
--- NOT
20 DAA Algorithm 2 Chalk APPLICABLE
---
--- NOT
5 Summary 1 Talk APPLICABLE
---

Tutorial Course DELIVERY Plan: NO Delivery Plan Exists

Tutorial Session wise Teaching – Learning Plan

No Session Plans Exists

Practical Course DELIVERY Plan:


Tutorial
Session Topics CO-Mapping
no

1 Implementation of Caesar Cipher and Vigenère Cipher CO5

2 Implementation of Playfair Cipher substitution technique CO5

3 Implementation of Rail fence and Columnar Transposition Techniques CO5

4 Implementation of Simplified - Data Encryption Standard Algorithm CO5

5 mplementation of AES Key Generation. CO5

6 Implementation of Substitute bytes and Shift rows operations in AES CO5

7 Implementation LCG and Blum-Blum Sub generators CO5

8 Apply RSA Algorithm on given Plaintext CO5


about:blank 15/24
7/18/25, 9:33 AM about:blank

Tutorial
Session Topics CO-Mapping
no

9 Implementation of Diffie-Hellman Algorithm CO5

10 Implementation of Elgamal Cryptosystem Algorithm CO5

11 Implementation a Two Hash Functions CO5

12 Implementation a Simple Hash Algorithm (SHA-512) CO5

Practical Session wise Teaching – Learning Plan

SESSION NUMBER : 1

Session Outcome: 1 Apply Caesar Cipher on a given Plaintex

Session Outcome: 2 2 Apply Vigenere Cipher on a given Plaintext

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
10 Attendance 1 Talk APPLICABLE
---
--- NOT
30 Implementation of Caesar Cipher 3 LTC APPLICABLE
---
--- NOT
30 Implementation of Vigenere Ciphe 3 LTC APPLICABLE
---
--- NOT
30 Viva Voic 2 Talk APPLICABLE
---

SESSION NUMBER : 2

Session Outcome: 1 Apply Playfair Cipher to encrypt the given Plaintext

Session Outcome: 2 Apply Playfair Cipher to decrypt the given Ciphertext

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
10 Attendance 1 Talk APPLICABLE
---
--- NOT
30 Implementation of Playfair Cipher - Encryption 3 LTC APPLICABLE
---
--- NOT
30 Implementation of Playfair Cipher - Decryption 3 LTC APPLICABLE
---
about:blank 16/24
7/18/25, 9:33 AM about:blank

--- NOT
30 Viva Voic 2 Talk APPLICABLE
---

SESSION NUMBER : 3

Session Outcome: 1 Apply Railfence Transposition on a given Plaintext

Session Outcome: 2 Apply Columnar Transposition on a given Plaintex

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
10 Attendance 1 Talk APPLICABLE
---
--- NOT
30 Implementation of Railfence Transposition 3 LTC APPLICABLE
---
--- NOT
30 Implementation of ColumnarTransposition 3 LTC APPLICABLE
---
--- NOT
30 Viva Voice 1 Talk APPLICABLE
---

SESSION NUMBER : 4

Session Outcome: 1 Apply Data Encryption Standard Key Generation Algorithm

Session Outcome: 2 Apply Data Encryption Standard Encryption Algorithm

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
10 Attendance 1 Talk APPLICABLE
---
--- NOT
Implementation of Data Encryption Standard Key
30 3 LTC APPLICABLE
Generation Algorithm
---
--- NOT
Implementation of Data Encryption Standard Encryption
30 3 LTC APPLICABLE
Algorithm
---
--- NOT
30 Viva Voic 1 Talk APPLICABLE
---

SESSION NUMBER : 5

Session Outcome: 1 Apply AES Key Generation Algorithm to Generate Keys

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods

about:blank 17/24
7/18/25, 9:33 AM about:blank

--- NOT
10 Attendance 1 Talk APPLICABLE
---
--- NOT
30 Implementation of AES Key Generatio 3 LTC APPLICABLE
---
--- NOT
30 Results & Documentation 3 LTC APPLICABLE
---
--- NOT
30 Viva Voic 1 Talk APPLICABLE
---

SESSION NUMBER : 6

Session Outcome: 1 Apply AES Substitute Byte Operation on the Plaintext

Session Outcome: 2 Apply AES Shift Row Operation on the Plaintext

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
10 Attendance 1 Talk APPLICABLE
---
--- NOT
30 Implementation of Substitute bytes in AES. 3 LTC APPLICABLE
---
--- NOT
30 Implementation of Shift rows operations in AES 3 LTC APPLICABLE
---
--- NOT
30 Viva Voice 1 Talk APPLICABLE
---

SESSION NUMBER : 7

Session Outcome: 1 Apply LCG to generate random numbers

Session Outcome: 2 Apply BBS to generate random numbers

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
10 Attendance 1 Talk APPLICABLE
---
--- NOT
30 Implementation LCG 3 LTC APPLICABLE
---
--- NOT
30 Implementation Blum-Blum Sub generators 3 LTC APPLICABLE
---
30 Viva Voice 1 Talk --- NOT
APPLICABLE
about:blank 18/24
7/18/25, 9:33 AM about:blank

---

SESSION NUMBER : 8

Session Outcome: 1 Apply RSAAlgorithm on given Plaintext

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
10 Attendance 1 Talk APPLICABLE
---
--- NOT
30 Implementation of RSA Algorithm 3 LTC APPLICABLE
---
--- NOT
30 Results & Documentation 3 LTC APPLICABLE
---
--- NOT
30 Viva Voic 1 Talk APPLICABLE
---

SESSION NUMBER : 9

Session Outcome: 1 Apply Diffie-Hellman Algorithm

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
10 Attendance 1 Talk APPLICABLE
---
--- NOT
30 Implementation of Diffie-Hellman Algorithm 3 LTC APPLICABLE
---
--- NOT
30 Results & Documentation 3 LTC APPLICABLE
---
--- NOT
30 Viva Voic 1 Talk APPLICABLE
---

SESSION NUMBER : 10

Session Outcome: 1 Apply Elgamal Algorithm

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
10 Attendance 1 Talk APPLICABLE
---
--- NOT
30 Implementation of Elgamal Algorithm 3 LTC APPLICABLE
---
about:blank 19/24
7/18/25, 9:33 AM about:blank

--- NOT
30 Results & Documentation 3 LTC APPLICABLE
---
--- NOT
30 Viva Voic 1 Talk APPLICABLE
---

SESSION NUMBER : 11

Session Outcome: 1 Apply Two Simple Hash Functions to Generate Hash Code

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
10 Attendance 1 Talk APPLICABLE
---
--- NOT
30 Implementation a Two Simple Hash Functions 3 LTC APPLICABLE
---
--- NOT
30 Results & Documentation 3 LTC APPLICABLE
---
--- NOT
30 Viva Voic 1 Talk APPLICABLE
---

SESSION NUMBER : 12

Session Outcome: 1 Apply Implementation of SHA-512 Algorithm to Generate Hash Code

Teaching- Active
Time(min) Topic BTL Learning Learning
Methods Methods
--- NOT
10 Attendance 1 Talk APPLICABLE
---
--- NOT
30 Implementation of SHA-512 Algorithm 3 LTC APPLICABLE
---
--- NOT
30 Results & Documentation 3 LTC APPLICABLE
---
--- NOT
30 Viva Voic 1 Talk APPLICABLE
---

Skilling Course DELIVERY Plan: NO Delivery Plan Exists

Skilling Session wise Teaching – Learning Plan

No Session Plans Exists

WEEKLY HOMEWORK ASSIGNMENTS/ PROBLEM SETS/OPEN ENDEDED PROBLEM-SOLVING EXERCISES etc:

about:blank 20/24
7/18/25, 9:33 AM about:blank

Assignment Assignment
Week Topic Details co
Type No

COURSE TIME TABLE:

Hour 1 2 3 4 5 6 7 8 9
Day Component
- - - - -
Theory -- -- -- --
- - - - -
- - - - -
Tutorial -- -- -- --
- - - - -
Mon
- - - - -
Lab -- -- -- --
- - - - -
- - - - -
Skilling -- -- -- --
- - - - -
- - - - -
Theory -- -- -- --
- - - - -
- - - - -
Tutorial -- -- -- --
- - - - -
Tue
- - - - -
Lab -- -- -- --
- - - - -
- - - - -
Skilling -- -- -- --
- - - - -
- - - - -
Theory -- -- -- --
- - - - -
- - - - -
Tutorial -- -- -- --
- - - - -
Wed
- - - - -
Lab -- -- -- --
- - - - -
- - - - -
Skilling -- -- -- --
- - - - -
- - - - -
Theory -- -- -- --
- - - - -
- - - - -
Tutorial -- -- -- --
- - - - -
Thu
- - - - -
Lab -- -- -- --
- - - - -
- - - - -
Skilling -- -- -- --
- - - - -
Fri - - V-S101,V- V-S101,V- - - -
Theory - - V-S201,V-S202 V-S201,V-S202 S102,V- S102,V- - - -
- - S103,V-S203 S103,V-S203 - - -
- - - - -
Tutorial - - -- -- -- -- - - -
- - - - -
Lab - - V-S101,V-S101,V- V-S101,V-S101,V- V-S201,V- V-S201,V- - - -
- - S101,V-S102,V- S101,V-S102,V- S201,V- S201,V- - - -
- - S102,V-S102,V- S102,V-S102,V- S201,V- S201,V- - - -
S103,V-S103,V- S103,V-S103,V- S202,V- S202,V-
S202,V-S202 S202,V-S202

about:blank 21/24
7/18/25, 9:33 AM about:blank

S103,V-S203,V- S103,V-S203,V-
S203,V-S203 S203,V-S203
- - - - -
Skilling - - -- -- -- -- - - -
- - - - -
- - - - -
Theory -- -- -- --
- - - - -
- - - - -
Tutorial -- -- -- --
- - - - -
Sat
- - - - -
Lab -- -- -- --
- - - - -
- - - - -
Skilling -- -- -- --
- - - - -
- - - - -
Theory -- -- -- --
- - - - -
- - - - -
Tutorial -- -- -- --
- - - - -
Sun
- - - - -
Lab -- -- -- --
- - - - -
- - - - -
Skilling -- -- -- --
- - - - -

REMEDIAL CLASSES:

Supplement course handout, which may perhaps include special lectures and discussions that would be
planned, and schedule notified according

SELF-LEARNING:

Assignments to promote self-learning, survey of contents from multiple sources.


S.no Topics CO ALM References/MOOCS

DELIVERY DETAILS OF CONTENT BEYOND SYLLABUS:

Content beyond syllabus covered (if any) should be delivered to all students that would be planned, and
schedule notified accordingly.
Advanced Topics, Additional Reading, Research
S.no CO ALM References/MOOCS
papers and any

EVALUATION PLAN:

Evaluation Evaluation Assessment Duration


Weightage/Marks CO1 CO2 CO3 CO4 CO5
Type Component Dates (Hours)
End Lab End Weightage 16 16
Semester 90
Semester Exam Max Marks 50 50
Summative
Evaluation End Semester Weightage 24 6 6 6 6
Total= 40 90
Exam
% Max Marks 100 25 25 25 25
about:blank 22/24
7/18/25, 9:33 AM about:blank

Continuous Weightage 10 10
Evaluation - 120
In Semester Lab Exercise Max Marks 50 50
Formative Home
Weightage 6 1.5 1.5 1.5 1.5
Evaluation Assignment and 120
Total= 24 Textbook Max Marks 40 10 10 10 10
%
Weightage 8 2 2 2 2
ALM 120
Max Marks 40 10 10 10 10
Lab In Weightage 8 8
90
In Semester Semester Exam Max Marks 50 50
Summative Weightage 14 7 7
Semester in
Evaluation 90
Exam-II Max Marks 50 25 25
Total= 36
% Semester in Weightage 14 7 7
90
Exam-I Max Marks 50 25 25

ATTENDANCE POLICY:

Every student is expected to be responsible for regularity of his/her attendance in class rooms and
laboratories, to appear in scheduled tests and examinations and fulfill all other tasks assigned to him/her in
every course
In every course, student has to maintain a minimum of 85% attendance to be eligible for appearing in
Semester end examination of the course, for cases of medical issues and other unavoidable circumstances the
students will be condoned if their attendance is between 75% to 85% in every course, subjected to
submission of medical certificates, medical case file and other needful documental proof to the concerned
departments

DETENTION POLICY :

In any course, a student has to maintain a minimum of 85% attendance and In-Semester Examinations to be
eligible for appearing to the Semester End Examination, failing to fulfill these conditions will deem such
student to have been detained in that course.

PLAGIARISM POLICY :

Supplement course handout, which may perhaps include special lectures and discussions

COURSE TEAM MEMBERS, CHAMBER CONSULTATION HOURS AND CHAMBER VENUE DETAILS:

Supplement course handout, which may perhaps include special lectures and discussions
Chamber
Delivery Sections Chamber Chamber Signature
Consultation
Name of Faculty Component of Consultation Consultation of Course
Timings for
of Faculty Faculty Day (s) Room No: faculty:
each day
Ruth Ramya Kalangi L 101-MA - - - -
Ruth Ramya Kalangi P 101-A - - - -
Satish Babu Jampani P 102-B - - - -
Swetha Kolachana P 103-B - - - -
Govind D P 203-B - - - -
Supriya Pacha P 203-C - - - -
Ravi Rastogi L 203-MA - - - -
Ravi Rastogi P 203-A - - - -
about:blank 23/24
7/18/25, 9:33 AM about:blank

Sunitha Pachala P 202-B - - - -


Tejo Gudipalli L 202-MA - - - -
Tejo Gudipalli P 202-A - - - -
LAKSHMANARAO
P 101-C - - - -
BATTULA
Jacob Ganta P 201-B - - - -
ARAVIND
L 103-MA - - - -
NALAMOTHU
ARAVIND
P 103-A - - - -
NALAMOTHU
Faizal Nujumudeen L 102-MA - - - -
Faizal Nujumudeen P 102-A - - - -
LOBSANG DARGE L 201-MA - - - -
LOBSANG DARGE P 201-A - - - -
102-
Prerna Mohit P - - - -
C,202-C
SANDEEP
P 101-B - - - -
SHARMA
MOSHEDAYAN 103-
P - - - -
SIRAPANGI C,201-C

GENERAL INSTRUCTIONS

Students should come prepared for classes and carry the text book(s) or material(s) as prescribed by the
Course Faculty to the class.

NOTICES

Most of the notices are available on the LMS platform.

All notices will be communicated through the institution email.

All notices concerning the course will be displayed on the respective Notice Boards.

Signature of COURSE COORDINATOR

(Ruth Ramya Kalangi)

Signature of Department Prof. Incharge Academics & Vetting Team Member

Department Of CSE-1

HEAD OF DEPARTMENT:

Approval from: DEAN-ACADEMICS


(Sign with Office Seal) [object HTMLDivElement]

about:blank 24/24

You might also like