COURSE SUMMARY
Course Title: 
Data Security
Course Code: 
15ECE363
Year Taught: 
2015
Type: 
Elective
Degree: 
Undergraduate (UG)
School: 
School of Engineering
Campus: 
Bengaluru
Chennai
Coimbatore
Amritapuri

'Data Security' is an elective course offered for the B. Tech. (Bachelor of Technology) in Electronics and Communication Engineering at School of Engineering, Amrita Vishwa Vidyapeetham.

Unit 1

Introduction:History of Cryptography. Mathematical background: Probability theory -Information theory - Complexity theory, Number theory. Symmetric (Private) Key Cryptographic Systems: Caesar – Aff ine - Monoalphabetic Substitution – Transposition - Homophonic substitution – Vignere - Beauford and DES Family - Product ciphers - Lucifer and DES.

Unit 2

Asymmetric (Public) Key Cryptographic Systems: Concept of PKCS, RSA Cryptosystem- Variants of RSA - Primality testing - Security of RSA - Merkle – Hellamn - Security of Merkle – Hellaman, ElGamal. Elliptical Curve Cryptography. Stream ciphers and block ciphers: The one time pad - Synchronous stream ciphers - Self-synchronizing stream ciphers - Feedback shift registers - Linear Complexity – Non-linear feedback shift registers - Stream ciphers based LFSRs. Non-linear Combination generators - Non linear filter generators - Clock controlled generators - The alternating step generators - The shrinking generators.

Unit 3

Digital Signatures: Properties, Generic signature schemes - Rabin Lamport - Matyasmeyer, RSA - Multiple RSA and ElGamal Signatures - Digital signature standard - Blind Signatures- RSA Blind. Secret Sharing Algorithms: Threshold secret sharing - Shamir scheme, Blakley scheme and modular Scheme. Pseudo random number generators: Definition of randomness and pseudo-randomness - Statistical tests of randomness - Linear congruential generator - Modern PRNGs (a brief description).

TEXTBOOKS

  1. Padmanabhan T R, Shyamala C and Harini N, “Cryptography and Security”, Wiley Publications 2011.
  2. Josef Pieprzyk, Thomas Hardjono and Jenifer Seberry, “Fundamentals of Computer Security”, Springer 2010.

REFERENCES

  1. Douglas R Stinson, “Cryptography:Theory and Practice”, CRC Press 2005.
  2. Alfred J Menezes, Paul C Van Oorshot and Scott A. Vanstone, “Handbook of Applied Cryptography”, CRC press 1996.