Skip to content

Latest commit

 

History

History
127 lines (108 loc) · 5.42 KB

505-Introduction-to-Cryptographic-Techniques.org

File metadata and controls

127 lines (108 loc) · 5.42 KB

<<<505>>> INTRODUCTION TO CRYPTOGRAPHIC TECHNIQUES

{{{credits}}}

LTPC
3003

COURSE OBJECTIVES

  • To understand the classical and symmetric cryptographic techniques
  • To study about message authentication and hash functions
  • To learn number theory fundamentals needed by cryptographic algorithms
  • To understand the various key distribution and management schemes
  • To understand the concepts of Public key cryptography and digital signatures.

{{{unit}}}

UNIT IINTRODUCTION AND CLASSICAL CRYPTOGRAPHY & SYMMETRIC CRYPTOGRAPHY10

Cryptography and Modern Cryptography – Setting of Private-Key Encryption – Historical Ciphers – Basic Principles; Perfectly Secret Encryption; Private-Key Encryption and Pseudorandomness.

{{{unit}}}

UNIT IIMESSAGE AUTHENTICATION CODES AND COLLISION-RESISTANT HASH FUNCTIONS8

Secure Communication and Message Integrity – Encryption vs. Message Authentication – Message Authentication Codes – Constructing Secure Message Authentication Codes – CBC-MAC – Collision-Resistant Hash Functions – NMAC and HMAC – Constructing CCA-Secure Encryption Schemes – Obtaining Privacy and Message Authentication.

{{{unit}}}

UNIT IIIBLOCK CIPHERS10

Substitution-Permutation Networks – Feistel Networks – DES – AES – Differential and Linear Cryptanalysis; One-Way Functions – From One-Way Functions to Pseudo randomness – Constructing Pseudorandom Generators – Constructing Pseudorandom Permutations – Necessary Assumptions for Private-Key Cryptography.

{{{unit}}}

UNIT IVNUMBER THEORY & KEY DISTRIBUTION8

Number Theory: Preliminaries and Basic Group Theory – Primes, Factoring, and RSA – Cryptographic Applications of Number-Theoretic Assumptions; Private-Key Management and the Public-Key Revolution: Limitations of Private-Key Cryptography – Key Distribution Centers – The Public-Key Revolution – Diffie-Hellman Key Exchange.

{{{unit}}}

UNIT VPUBLIC-KEY ENCRYPTION & DIGITAL SIGNATURE9

Public-Key Encryption – An Overview – Definitions – Hybrid encryption – RSA encryption – The El Gamal Encryption Scheme – Security Against Chosen-Ciphertext Attacks;Digital Signatures Schemes: An Overview – Definitions – RSA Signatures – The Hash-and-Sign Paradigm – Lamport’s One-Time Signature Scheme – Signatures from Collision – Resistant Hashing – The Digital Signature Standard – Certificates and Public-Key Infrastructures; Authentication Protocol: SSL and TLS.

\hfill Total Periods: 45

COURSE OUTCOMES

Upon the completion of the course the students should be able to:

  • Describe and implement classical and symmetric ciphers (K2)
  • Describe the authentication schemes and hash algorithms (K2)
  • Understand the number theoretic foundations of cryptography (K3)
  • Compare and contrast various Public key cryptographic techniques (K3)
  • Illustrate various Public key cryptographic techniques (K3).

TEXT BOOKS

  1. Jonathan Katz, Yehuda Lindell, “Introduction to Modern Cryptography”, 2nd Edition (Chapman & Hall/CRC Cryptography and Network Security Series), 2014.

REFERENCES

  1. Wenbo Mao, “Modern Cryptography – Theory and Practice”, Pearson Education, 2004.
  2. Johannes A Buchmann, “Introduction to Cryptography”, 2nd edition, Pearson Education, Springer, 2009.
  3. Charles P Pfleeger, Shari Lawrence Pfleeger, “Security in computing”, 3rd Edition, Prentice Hall of India, 2006.
  4. Bruce Schneier, Neils Ferguson, “Practical Cryptography”, 1st Edition, Wiley Dreamtech India Pvt Ltd, 2003.
  5. http://nptel.ac.in/courses/106105031/lecture by Dr Debdeep Mukhopadhyay, IIT Kharagpur.

CO PO MAPPING

PO1PO2PO3PO4PO5PO6PO7PO8PO9PO10PO11PO12PSO1PSO2PSO3
K3K6K6K6K6-------K5K3K6
CO1K2211
CO2K2211
CO3K3322
CO4K3322
CO5K3322
Score1388
Course Mapping322