Vous êtes sur la page 1sur 2

Birla Institute of Technology and Science, Pilani - K.K.

Birla Goa Campus Second Semester, 2013-14 Course Handout (Part-II)


In addition to part I (General Handout for all courses appended to the time table) this portion gives further specic details regarding the course. Course Title: Cryptography Instructor-in-charge: Dr. S.K. Sahay Course No.: BITS C463 Chamber No.: A-407

Objective:
A comprehensive introduction to applied cryptography for the understanding of how cryptographic schemes works. The course aims to prepare the students for taking more rigorous and specialized courses in this and related elds.

Course Description:
The course will provide a comprehensive introduction to applied cryptography, suited to students and practitioners in industry. The necessary mathematical concepts will be introduce in a way that students with a minimum calculus background will understand. Focus will be on practical relevance by introducing most crypto algorithms that are used in modern real-world applications. The important issue of software and hardware implementation for the algorithm will be discuss. Also, lightweight ciphers, important cryptographic protocols, modes of operation, security services will be taught.

Text Book: T1: Applied Cryptography, John Wiley & Sons, 2nd Edition, 2006.
Bruce Schneier.

Reference Books: R1: Cryptography and Network Security, 4th Edition, 2006, Pearson Education.
William Stallings. R2: An Introduction to Cryptography, Chapman & Hall/CRC, 2nd Edition, 2007. Richard A. Mollin. R3: Introduction to Cryptography, Springer, 2nd Edition, 2004. Johannes Buchmann.

Evaluation:
Component Test-I Test-II Comprehensive Test Nature Closed Book Closed Book Open Book Examination Date 18/09/2013 28/10/2013 03/12/2013 Weightage 30% 25% 45%

P.T.O

Course Plan:
L. No. 1-3 Topics Basics of cryptography, Simple symmetric encryption, General thoughts on breaking cryptosystems, Modular arithmetic, Groups, Integer rings and some historical ciphers. Encryption and decryption of stream ciphers, Random numbers, Cryptographically secure pseudo random number generators, One time pad, Linear feedback shift register, Trivium. Fiestel ciphers, Encryption, Decryption, Security and Implementations of Data Encryption Standard (DES), 3DES, DESX, Lightweight cipher. Galois elds, Internal structure of Advance Encryption Standard (AES), Security and implementation of AES. Modes of operations of block ciphers: ECB, CBC, OFB, CFB, CTR, Enhancing the security of block ciphers, Hash functions from block ciphers, MD4 family, Secure hash algorithm, SHA-I, Message authentication codes from hash functions and block ciphers, Galois counter message authentication code. Aspects of Public-key cryptography, Relevant number theory for public-key algorithms. Encryption, decryption, efciency & correctness of RSA, Prime numbers, RSA in practice and attacks. Diffe-Hellman key exchange and its security issues, Discrete logarithm problem, Elgamal encryption scheme. Elliptic curve cryptosystem, Discrete logarithm problem with elliptic curves, Diffe-Hellman key exchange with elliptic curve. Principles of digital signatures, RSA, Elliptic curve and Elgamal digital signature scheme, Digital signature algorithm. Qunatum Cryptography Conclusion and Summary. References T1: 1.1, 1.3-1.5; R1: 4.1, 4.2; Class notes T1: 1.5, 9.4, 9.5, 9.7, 16.1-16.4; R1: 7.4; Class notes T1: 12.1-12.3, 15.115.3; Class notes R1: 4.3-4.6, 5.1-5.2; Class notes T1: 9.3, 9.6, 9.8, 9.9; Class notes T1: 18.1, 18.7, 18.10, 18.11; R1: 12.3; Class notes T1: 11.3-11.5; R1: 8.1-8.4; Class notes T1: 19.3; R1: 9.1-9.2; Class notes T1: 19.6; R1: 10.110.2; Class notes T1: 19.8; R1: 10.310.4; Class notes T1: 20.1, 20.4 R1: 13.1-13.3, Class notes Class notes

4-6

7 - 10

11 - 14 15 - 17

18 - 22

23 - 25 26 - 28 29 - 31 32 - 34 35 - 37 38 - 40 41

Make-up policy: Make-up will be granted strictly on prior permission and on justiable grounds
only.

Course notices: All notices for this course will be display on CS & IS notice board and/or ftp://10.1.1.223/. Consultation hours: Will be announced in the class.
Instructor-in-Charge BITS C463

Vous aimerez peut-être aussi