top of page

Course Code - CSE1011
Credits - 4
Modules - 8

NOTE:

The best channels for learning cryptography are:

Christoff Paar: channel link(university lectures)

Abhishek Sharma:channel link(hindi lectures)

You can learn theory from Christoff Paar and the techniques/methods from Abhishek sharma


 
MODULE 1:

Topics Included: Information Security - Confidentiality, Integrity & Availability – Authentication, Authorization & Non-Repudiation – Introduction to Plain Text, Cipher Text, Encryption and Decryption Techniques, Secure Key, Hashing, Digital signature Intro to Cryptography Modular Arithimetic Stream Ciphers, Random Numbers, One Time Pad Stream Ciphers and Linear Feedback Shift Registers


 
MODULE 2:

Topics Included: Block cipher, Stream cipher - Data Encryption Standard (DES) - Cipher Block Chaining (CBC) – Multiple Encryption DES - International Data Encryption Algorithm (IDEA) - Advanced Encryption Standard (AES)

Data Encryption Standard(DES) DES: Key Schedule and Decryption Introduction to Galois Fields for AES Advanced Encryption Standard Modes of Operation for Block Ciphers Multiple Encryption and Brute-Force Attacks


 
MODULE 3:

Topics Included: Asymmetric key generation techniques – Applications of asymmetric encryption methods – RSA Elliptic Curve Cryptography – Homomorphic encryption Number Theory for PKC(Euclidean Algorithm,Euler’s Phi Function & Euler’s Theorem RSA Cryptosystem Introduction to Elliptic Curves Elliptic Curve Cryptography(ECC)


 
MODULE 4:

Topics Included: Digital signature standards - Secure One-time Signatures - Application of Digital Signatures - DiffieHellman Key Exchange - Elliptic Curve Digital Signature algorithm

Diffie-Hellman Key Exchange and DLP Security Of Diffie-Hellman Elgamal Encryption https://www.youtube.com/watch?v=jbBe4AS5pk0 https://www.youtube.com/watch?v=AQXRX55hgHs&t=4215s


 
MODULE 5:

Topics Included: Cryptographic Hash Functions- Applications- Simple hash functions and features for ensuring security – Hash functions based on Cipher Block Chaining- Secure Hash Algorithm (SHA) - Message Digest - MD5

Hash Functions SHA-1 Hash Function SHA-3 Hash Function


 
MODULE 6:

Topics Included: Authentication Systems – Password and Address – Security Handshake Drawbacks - Authentication Standards – Kerberos- PKI Trust Models -Message Authentication Codes (MAC) – Security features- MAC based on Hash Functions - MAC based on Block Ciphers

Message Authentication Codes Symmetric Key Establishment and Kerberos


 
MODULE 7:

Topics Included: Applying cryptography algorithms - Smart cards-Mobile phone security - Electronic passports and ID cards - SDA/DDA/CDA Bank Cards - Financial Cryptography – Secure Payment Systems - Crypto currencies - Bitcoin

Material uploaded by faculty is enough.


 
MODULE 8:

Topics Included: *Security and Protection - Mechanism Vs Policies Access and authentication - models of protection Memory Protection Disk Scheduling - OS performance, Scaling OS - Mobile OS: Recent Trends: - Future directions in Mobile OS / Multi-core Optimization /Power efficient Scheduling

Material uploaded by faculty is enough.


 

bottom of page