Back close

Course Detail

Course Name Cryptography and Cybersecurity
Course Code 18CSA318
Program Bachelor of Computer Applications, B. C. A., B. C. A. (Bachelor of Computer Applications)
Semester Six
Credits Four
Year Taught 2018
Degree Undergraduate (UG)
School School of Arts and Sciences, School of Engineering
Campus Kochi, Mysuru, Amritapuri


Unit 1

Introduction to Cyber Security – Types of Attacks, Goals for Security, Security threat and vulnerability, Cyber security models (the CIA triad, the star model). Classical encryption techniques substitution ciphers and transposition ciphers, cryptanalysis, steganography, Stream and block ciphers – Modern Block Ciphers: Block ciphers principles, Shannon’s theory of confusion and diffusion. Data encryption standard (DES), Strength of DES, Idea of differential cryptanalysis, block cipher modes of operations.

Unit 2

Principals of public key crypto systems, RSA algorithm, security of RSA. Key Management and distribution: Symmetric key distribution, Diffie-Hellman Key Exchange, Public key distribution, Introduction to SSL.

Unit 3

Message Authentication Codes: Authentication requirements, authentication functions, message authentication code, hash functions, birthday attacks, security of hash functions,

Unit 4

Digital Signatures: Digital Signatures, Elgamal Digital Signature Techniques, Digital signature standards (DSS), proof of digital signature algorithm.

Unit 5

Introduction to Cyber Crime and security: Cyber Crimes, types of Cyber Crime, hacking, attack vectors, Cross Site Scripting (XSS), XSS Consequences. Cyber Space and criminal behaviour, traditional problems associated with Cyber Crime, Introduction to Incident Response, Digital Forensics – Phishing.


The main objective of this course is to introduce the working of various cryptographic methods and how to apply this knowledge to real-world applications. This course will also present an overview of Cyber Security.

Text Books / Reference

  1. William Stallings, “Cryptography and Network Security: Principals and Practice”, Pearson Education, Sixth Edition.


  1. Nina Godbole and SunitBelpure, Cyber Security: Understanding Cyber crimes, ComputerForeinsics and Legal Perspectives, Willey India Pvt.Ltd.
  2. Dr T R Padmanabhan N Harini,”Cryptography and Security Paperback”, Wiley India

DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.

Admissions Apply Now