csc327

Cryptography

Exam Preparation: 30 hours
Deep Understanding: 80 hours
Subject Code CSC 327
Credit Hours 3 Hours
Nature Theory + Lab
Full Marks 60 + 20 + 20
Pass Marks 24 + 8 + 8
Description

This course introduces the principles and design of cryptosystems, covering traditional ciphers, block ciphers, stream ciphers, public and private key cryptosystems, hash functions, authentication systems, network security protocols, and malicious logic.

Objective

Familiarize students with cryptography and its applications,Develop basic understanding of cryptographic mechanisms

Course Contents

Introduction and Classical Ciphers

7 Hours

Security: Computer Security, Information Security, Network Security, CIA Triad, Cryptography, Cryptosystem, Cryptanalysis, Security Threats and Attacks, Security Services, Security Mechanisms, Classical Cryptosystems: Substitution Techniques (Caesar, Monoalphabetic, Playfair, Hill, Polyalphabetic ciphers, One-time pad), Transposition Techniques (Rail Fence Cipher), Modern Ciphers: Block vs. Stream Ciphers, Symmetric vs. Asymmetric Ciphers

Symmetric Ciphers

10 Hours

Feistel Cipher Structure, Substitution Permutation Network (SPN), Data Encryption Standards (DES), Double DES, Triple DES, Finite Fields: Groups, Rings, Fields, Modular Arithmetic, Euclidean Algorithm, Galois Fields (GF(p) & GF(2^n)), Polynomial Arithmetic, International Data Encryption Standard (IDEA), Advanced Encryption Standards (AES) Cipher, Modes of Block Cipher Encryptions: ECB, CBC, CFB, OFB, Counter Mode

Asymmetric Ciphers

8 Hours

Number Theory: Prime Numbers, Fermat’s Theorem, Euler’s Theorem, Primality Testing, Miller-Rabin Algorithm, Extended Euclidean Theorem, Discrete Logarithms, Public Key Cryptosystems and Applications, Key Distribution: Diffie-Hellman Key Exchange, Man-in-the-Middle Attack, RSA Algorithm, ElGamal Cryptographic System

Cryptographic Hash Functions and Digital Signatures

8 Hours

Message Authentication, Message Authentication Functions, Message Authentication Codes, Hash Functions: Properties and Applications, Message Digests: MD4 and MD5, Secure Hash Algorithms: SHA-1 and SHA-2, Digital Signatures: Direct and Arbitrated Digital Signatures, Digital Signature Standard: DSS Approach, Digital Signature Algorithm, RSA Approach

Authentication

3 Hours

Authentication Systems, Password-Based Authentication, Dictionary Attacks, Challenge Response Systems, Biometric Systems, Needham-Schroeder Scheme, Kerberos Protocol

Network Security and Public Key Infrastructure

6 Hours

Overview of Network Security, Digital Certificates and X.509 certificates, Certificate Life Cycle Management, PKI Trust Models, PKIX, Email Security: Pretty Good Privacy (PGP), Secure Socket Layer (SSL) and Transport Layer Security (TLS), IP Security (IPSec), Firewalls and Types

Malicious Logic

3 Hours

Malicious Logic Types: Virus, Worm, Trojan Horse, Zombies, Denial of Service Attacks, Intrusion, Intruders and Types, Intrusion Detection System

Laboratory Works

Implement and simulate cryptographic algorithms, hash functions, digital signatures, network security protocols and malicious logic,Students may use any programming language and platform based on their skills

Books

Textbooks

W. Stallings, Cryptography and Network Security, Pearson Education

Reference Books

William Stallings, Network Security, Principles and Practice
Matt Bishop, Computer Security, Art and Science
Mark Stamp, Information Security: Principles and Practices
Bruce Schneier, Applied Cryptography
Douglas R. Stinson, Cryptography: Theory and Practice
B. A. Forouzan, Cryptography & Network Security, Tata McGraw Hill