Back close

Course Detail

Course Name Applied Cryptography
Course Code 23AID451
Program B.Tech in Artificial Intelligence and Data Science
Campus Coimbatore , Amritapuri ,Faridabad , Bangaluru, Amaravati

Syllabus

Unit I

Number theory concepts – Divisibility,GCD,modular exponential,congruence,Chinese remainder theorem.Groups,rings,fields.

Unit II

Overview of Cryptography , Symmetric key cryptography, stream ciphers, block ciphers, DES and Enhancements, AES, Attacks on block ciphers, Message integrity- Message integrity: definition and applications. Hashing, collision resistance. Public key cryptography- Arithmetic modulo primes, Cryptography using arithmetic modulo primes, Public key encryption Arithmetic modulo composites,.RSA,Attacks on RSA, Rabin Cryptosystem, Discrete Logarithm Problem and related Algorithms, ElGamal Cryptosystem

Unit III

Introduction to Elliptic Curve Cryptography, Digital signatures: definitions and applications, More signature schemes and applications, Identification protocols, Authenticated key exchange and SSL/TLS session setup, Zero knowledge protocols. Key agreement protocols, Diffie-Hellman protocol, variations.

 

Course Objectives

  • To understand the underlying fundamentals of classical and modern cryptography
  • To understand about the cryptographic systems used over the Internet.
  • To help the students to study cryptographic protocols, common attacks and their prevention.

Course Outcomes

After completing this course, students will be able to

CO1 Analyze the concepts of classical and modern cryptography.
CO2 Analyze the common attacks and the preventive systems.
CO3 Apply appropriate cryptographic techniques to a security engineering problem
CO4 Implement standard security protocols.

 

CO-PO Mapping

PO/PSO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3
CO
CO1 3 3 2 2 2 2 3 2 2 1
CO2 3 3 3 3 2 2 3 1 2 1
CO3 3 2 3 3 1 2 2 3 2 2 1
CO4 3 2 3 3 2 2 3 1 2 1

Evaluation Pattern

Evaluation Pattern

Assessment Internal/External Weightage (%)
Assignments (minimum 2) Internal 30
Quizzes (minimum 2) Internal 20
Mid-Term Examination Internal 20
Term Project/ End Semester Examination External 30

Text Books / References

Text Books / References

James Strayer, Elementary Number Theory, Waveland Press, 2002.

Katz, Jonathan, and Yehuda Lindell. Introduction to modern cryptography. Chapman and Hall/CRC, 2014

Katz, Jonathan, Alfred J. Menezes, Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of applied ryptography. CRC press, 1996.

Stallings, William. Cryptography and network security: principles and practice. Upper Saddle River:Pearson, 2017

DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.

Admissions Apply Now