Introduction
Overview of computer networks and network security
Course Name | Cryptography and Applications |
Course Code | 18SN614 |
Program | M. Tech. in Cyber Security Systems & Networks |
Semester | 2 |
Credits | Amritapuri |
Year Taught | 2018 |
Overview of computer networks and network security
Concepts of Number Theory: Number Theory, GCD, Euclidean algorithm, Extended Euclidean algorithm, prime numbers, congruence’s, how to solve congruence equations, Chinese remainder theorem, residue classes and complete residue systems, Euler Fermat theorem, primitive roots.
Symmetric Key Cryptographic Systems: Caesar and affine ciphers, mono-alphabetic substitutions, transposition, homophonic, Vigenere and Beaufort ciphers, one-time pad, product/iterated/block ciphers, DES and AES. Heavy discussion is given to the security of these ciphers, not only are they studied in an algorithm sense but their attacks and defences are also discussed.
Cryptanalysis of symmetric keys- Attack Models, Linear, Differential and various others such as meet-in-the-middle attack.
PKCS- Concepts of PKCS, Diffie Hellman key-exchange protocol, RSA, Rabin and EL Gamal cryptosystems, primarily testing, pollard rho factorisation, man-in-the-middle attack.
Stream Ciphers- synchronous, self-synchronizing attack ciphers, linear feedback shift registers, Berlekamp-Massey algorithm, algebraic attacks. Digital Signatures- Rabin, Lamport, Matyas-Meyer, RSA, multiple RSA and ElGamal signatures, digital signature standard.
Hash Functions and MACs- Hash functions: the Merkle-Damgard construction, Message Authentication Codes, security of Hash functions, security weakness of MD4, MD5, SHA1,SHA2 and construction of SHA3, identification protocols, authenticated key exchange and SSL/TLS session setup, Zero knowledge protocols.
Basic elliptic curve cryptography: definition, mathematical formulation of them, elliptic curve cryptography and pairings, introduction to quantum computers and the future of cryptography.
“Cryptography and Applications” is a course offered in the second semester of M. Tech. in Cyber Security Systems & Networks program at School of Engineering, Amrita Vishwa Vidyapeetham, Amritapuri.
DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.