L T P Total Credits-4
4 0 0 4 Duration of Exam- Three hours





Basic Encryption and Decryption


Attackers and Types of threats, challenges for information security, Encryption Techniques, Classical Cryptographic Algorithms: Monoalphabetic Substituions such as the Casers Cipher, Cryptanalysis of Monoalphabetic ciphers, Polyalphabetic Ciphers such as Vigenere ; Vernam Cipher, Stream and Block Cipher


Number Theory


Prime Numbers, Greatest Common Divisor, Euclidean algorithm, Modular Arithmetic, Properties of Modular Arithmetic, Computing the inverse, Fermat’s Theorem, algorithm for computing inverses, Random number generation


Secret key Systems


The Data Encryption Standard(DES), Analyzing and Strengthening of DES, Introduction to Advance Encryption Standard (AES)


Key Management Protocols


Solving Key Distribution Problem, Diffie-Hellman Algorithm, Key Exchange with Public Key Cryptography


Public Key Encryption Systems


Public key Encryption, Rivets- Shamir- Adlman (RSA) Cryptosystem, elliptic curve cryptography, Rabin, ElGamal, Goldwasses- Micali , Blum-Goldwasser cryptosystem, The Digital Signature Standard (DSA), Security handshake pitfalls, Strong password protocols.


Hash Algorithms


Hash concept, description of Hash algorithms, Message Digest Algorithms such as MD4 and MD5, Secure Hash Algorithms such as SH1 and SHA2

Public Key Infrastructure (PKI)


Concept of digital Certificate, Certificate Authorities and its roles, X.509 Structure of Digital Certificate, Types of public key infrastructures


Introduction to Network Security


Network security Issues such as Impersonation, Message Confidentiality, Message Integrity, Code Integrity, Denial of Service, Securing Switches and Routers, Firewalls, DMZs, Virtual Private Networks, Network Monitoring and Diagnostic Devices, Virtual LANs, IPSec Secure Communication Mechanism, PKI based Authentication and Kerberos


Introduction to Web Security


Secure socket Layer protocol, Secure Electronic Transaction Protocol, Safe Guarding Web Servers, Secure Electronic Mail, Enhanced Email, Pretty Good Privacy, Public Key Cryptography Standards, Secure, SMIME




Suggested References


  1. A.J. Menezes .P. VAN OORSCHOT AND S. VANSTONE, “Handbook of Applied Cryptography”, CRC Press


  1. Principles of Cryptography, William Stallimgs, Pearson Education


  1. Cryptography & Network Security, Atul Kahate, TMH


Leave a Reply

Leave a Reply

Your email address will not be published.