CB3491
CRYPTOGRAPHY
AND CYBER SECURITY
COURSE
OBJECTIVES:
• Learn to analyze the security of
in-built cryptosystems.
• Know the fundamental mathematical
concepts related to security.
• Develop cryptographic algorithms for
information security.
• Comprehend the various types of data
integrity and authentication schemes
• Understand cyber crimes and cyber
security
.
UNIT
I INTRODUCTION
TO SECURITY
Computer
Security Concepts – The OSI Security Architecture – Security Attacks – Security
Services and Mechanisms – A Model for Network Security – Classical encryption
techniques: Substitution techniques, Transposition techniques, Steganography –
Foundations of modern cryptography: Perfect security – Information Theory –
Product Cryptosystem – Cryptanalysis.
UNIT
II SYMMETRIC CIPHERS
Number
theory – Algebraic Structures – Modular Arithmetic - Euclid‘s algorithm –
Congruence and matrices – Group, Rings, Fields, Finite Fields
SYMMETRIC KEY CIPHERS: SDES – Block Ciphers –
DES, Strength of DES – Differential and linear cryptanalysis – Block cipher
design principles – Block cipher mode of operation – Evaluation criteria for
AES – Pseudorandom Number Generators – RC4 – Key distribution.
UNIT
III ASYMMETRIC CRYPTOGRAPHY
MATHEMATICS
OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing – Factorization –
Euler’s totient function, Fermat’s and Euler’s Theorem – Chinese Remainder
Theorem – Exponentiation and logarithm
ASYMMETRIC
KEY CIPHERS: RSA cryptosystem – Key distribution – Key management – Diffie
Hellman key exchange -– Elliptic curve arithmetic – Elliptic curve cryptography.
UNIT
IV INTEGRITY AND AUTHENTICATION
ALGORITHMS
Authentication
requirement – Authentication function – MAC – Hash function – Security of hash
function: HMAC, CMAC – SHA – Digital signature and authentication protocols –
DSS – Schnorr Digital Signature Scheme – ElGamal cryptosystem – Entity
Authentication: Biometrics, Passwords, Challenge Response protocols –
Authentication applications – Kerberos
MUTUAL
TRUST: Key management and distribution – Symmetric key distribution using
symmetric and asymmetric encryption – Distribution of public keys – X.509
Certificates.
UNIT
V CYBER CRIMES AND CYBER SECURITY
Cyber
Crime and Information Security – classifications of Cyber Crimes – Tools and
Methods – Password Cracking, Keyloggers, Spywares, SQL Injection – Network
Access Control – Cloud Security – Web Security – Wireless Security
COURSE
OUTCOMES:
CO1:
Understand the fundamentals of networks security, security architecture,
threats and vulnerabilities
CO2:
Apply the different cryptographic operations of symmetric cryptographic
algorithms
CO3:
Apply the different cryptographic operations of public key cryptography CO4:
Apply the various Authentication schemes to simulate different applications.
CO5: Understand various cyber crimes and cyber security.
TEXT
BOOKS
1. William Stallings, "Cryptography and
Network Security - Principles and Practice", Seventh Edition, Pearson
Education, 2017.
2. Nina Godbole, Sunit Belapure, “Cyber
Security: Understanding Cyber crimes, Computer Forensics and Legal
Perspectives”, First Edition, Wiley India, 2011.
REFERENCES
1. Behrouz A. Ferouzan, Debdeep
Mukhopadhyay, "Cryptography and Network Security", 3rd Edition, Tata
Mc Graw Hill, 2015.
2. Charles Pfleeger, Shari Pfleeger,
Jonathan Margulies, "Security in Computing", Fifth Edition, Prentice
Hall, New Delhi, 2015.