Home      Affiliated Colleges      Course content      First Sem     Second Sem     Third Sem     Fourth Sem     Fifth Sem     Sixth Sem     Seventh Sem     Eighth Sem     Lab report 4th sem     Contact    

Sunday, January 31, 2010

5th sem syllabus:Introduction to Cryptography

Course Title: Introduction to Cryptography
Course no: CSC-313                                                                        Full Marks: 70+10+20
Credit hours: 3                                                                      Pass Marks: 28+4+8

Nature of course: Theory (3 Hrs.) + Lab (3 Hrs.)

Goal: The course objective is to familiarize basic concepts of cryptography so as the students can use their understanding for information security purpose.

Course Contents:

Unit 1. Introduction                                                                                      4 Hrs.

Security, Attacks, Attack Types, Viruses, Worms, Trojan Horses, Classical Cryptography

Unit 2. Basics of Modern Cryptography                                                  5 Hrs.

Plaintext, Ciphertext, keys, simple ciphers, public key cryptography, digital signatures

Unit 3. Conventional Encryption / Secret Key Cryptography                         10 Hrs.

Cryptography, Cryptanalysis, Cipher Structure, Encryption Algorithms, Data Enncryption Standard (DES), International Data Encryption Algorithm (IDEA), Advanced Encryption Standard (AES), Modes of Operation, Symmetric Block Ciphers, Cipher Block Chaining (CBC), Multiple Encryption DES

Unit 4. Public Key Cryptography                                                              6 Hrs.

Basic Number Theory, Factorization, Diffie-Hellman Key Exchange, Public Key Cryptography Algorithms, RSA.

Unit 5. Digital Signatures                                                                              4 Hrs.


One-time signatures, Digital Signature Standard (DSS).

Unit 6. Hashing and Message Digests                                                      6 Hrs.

Hashes, Motivation and applications. Cryptographically Secure Hashing, Secure Hash Algorithm (SHA), Encryption with Message Digest (MD), MD5.

Unit 7. Authentication and Public Key Infrastructure (PKI)                   5 Hrs.

Overview of Authentication Systems (Password, Address, Cryptographic), Security Handshake Pitfalls, Authentication Standards, Kerberos, PKI Trust Models.

Unit 8. Network Security                                                                             5 Hrs.

IP Security, Web Security, Secure Socket Layer (SSL), Transport Layer Security (TLS), Different versions of SNMPs, PGP.
Text / Reference books :

1.      D. R. Stinson. Cryptography: Theory and Practice. CRC Press
2.      William Stallings, Network Security Essentials-Applications & Standards, Pearson.
3.      Charlie Kaufman, Radia Perlman, Mike Speciner, Nework Security Private Communication in a Public World, Second Edition, 2004,Pearson.
4.      Matt Bishop, Computer Security, Art and Science, Pearson
5.      Bruce Schneier,  Applied Cryptography,  Pearson

No comments:

Post a Comment

^ Scroll to Top Related Posts with Thumbnails ^ Go to Top