Unit 1
Introduction: Basic objectives of
cryptography, secret-key and public-key cryptography,
one-way and trapdoor one-way functions,
cryptanalysis, attack models, classical
cryptography. Block ciphers: Modes of
operation, DES and its variants, RCS, IDEA,
SAFER, FEAL, BlowFish, AES, linear and
differential cryptanalysis. Stream ciphers:
Stream ciphers based on linear feedback shift
registers, SEAL, unconditional security.
Unit 2
Message digest: Properties of hash functions,
MD2, MD5 and SHA-1, keyed hash
functions, attacks on hash functions.
Public-key parameters: Modular arithmetic, gcd,
primality testing, Chinese remainder theorem,
modular square roots, finite fields.
Unit 3
Intractable problems: Integer factorization
problem, RSA problem, modular square root
problem, discrete logarithm problem,
Diffie-Hellman problem, known algorithms for
solving the intractable problems.
Unit 4
Public-key encryption: RSA, Rabin and EIGamal
schemes, side channel attacks. Key
exchange: Diffie-Hellman and MQV algorithms.
Digital signatures: RSA, DAS and NR
signature schemes, blind and undeniable
signatures. Entity authentication: Passwords,
challenge-response algorithms, zero-knowledge
protocols. Standards: IEEE, RSA and
ISO standards
Unit 5
Network issues: Certification, public-key
infrastructure (PKI), secured socket layer
(SSL), Kerberos. Advanced topics: Elliptic
and hyper-elliptic curve cryptography,
number field sieve, lattices and their
applications in cryptography, hidden monomial
cryptosystems, cryptographically secure
random number generators.
Reference Books:
1. William Stallings, Cryptography and
Network Security, PHI
2. Atul Kahate, “ Cryptography and Network
Security”, TMH
3. Calabrese, Info security
intelligence-cryptography principles appl., Cengage Learn
4. Krawetz, Intro to
network security, Cengage Learning.
No comments:
Post a Comment