Saturday 3 August 2013

MCIT - 201 Information Security System

Unit 1
Introduction: Basic objectives of cryptography, secret-key and public-key cryptography,
one-way and trapdoor one-way functions, cryptanalysis, attack models, classical
cryptography. Block ciphers: Modes of operation, DES and its variants, RCS, IDEA,
SAFER, FEAL, BlowFish, AES, linear and differential cryptanalysis. Stream ciphers:
Stream ciphers based on linear feedback shift registers, SEAL, unconditional security.
Unit 2
Message digest: Properties of hash functions, MD2, MD5 and SHA-1, keyed hash
functions, attacks on hash functions. Public-key parameters: Modular arithmetic, gcd,
primality testing, Chinese remainder theorem, modular square roots, finite fields.
Unit 3
Intractable problems: Integer factorization problem, RSA problem, modular square root
problem, discrete logarithm problem, Diffie-Hellman problem, known algorithms for
solving the intractable problems.
Unit 4
Public-key encryption: RSA, Rabin and EIGamal schemes, side channel attacks. Key
exchange: Diffie-Hellman and MQV algorithms. Digital signatures: RSA, DAS and NR
signature schemes, blind and undeniable signatures. Entity authentication: Passwords,
challenge-response algorithms, zero-knowledge protocols. Standards: IEEE, RSA and
ISO standards
Unit 5
Network issues: Certification, public-key infrastructure (PKI), secured socket layer
(SSL), Kerberos. Advanced topics: Elliptic and hyper-elliptic curve cryptography,
number field sieve, lattices and their applications in cryptography, hidden monomial
cryptosystems, cryptographically secure random number generators.
Reference Books:
1. William Stallings, Cryptography and Network Security, PHI
2. Atul Kahate, “ Cryptography and Network Security”, TMH
3. Calabrese, Info security intelligence-cryptography principles appl., Cengage Learn
4. Krawetz, Intro to network security, Cengage Learning.

No comments:

Post a Comment