You are on page 1of 1

RENCANA PENGAJARAN KRIPTOGRAFI

Pertem
uan
1

Topik

Subtopik

Introduction:
Classical
encryption techniques

Computer
security
concepts;
OSI
security architecture; symmetric cipher
model; subtitution techniques
Transposition
techniques;
rotor
machines; steganography; block ciphers
principles
Feistel Cipher; DES encryption and
decryption; strength of DES; differential
& linear cryptanalysis; block cipher
design principes; Euclidean algorithm;
modular arithmetic; group, rings, fields
Galois fields; polynomial arithmetic
AES encryption and decryption; AES
implementation
Block
cipher
modes;
multiple
encrytpion; triple DES; pseudorandom
number generators; stream ciphers; RC4

Classicial
encryption
techniques; Block ciphers

DES
(Data
Encryption
Standard); Number theory

4
5

Finite fields
AES (Advanced Encryption
Standard)
Block cipher modes of
opertions; Pseudorandom
number
generation;
Stream ciphers
UTS
Public-key cryptography

7
8
9

Other
cryptography

public-key

10

Crytographic
hash
functions;
Message
Authentication Codes

11

Digital signatures

12

Key management;
authentication

13

Network
and
security;
Engineering
UAS

14

User

internet
Security

Principles of public-key cryptosystem;


RSA
Diffle-Hellman key exchange; ElGamal
cryptosystem;
elliptic
curve
cryptography
Hash functions; security of hash
funcions; Secure Hash Algorithm (SHA);
Message Authentication Code (MAC);
Authentication encryption
Digital signatures; ElGamal digital
signature
scheme;
Schnorr
digital
signature scheme; digital signature
standard
Symmetric-key distributin; public-key
distribution; X.509 certificates; publickey
infrastucture;
remote
user
authentication;
Kerberos;
federated
identity management
Transport-level security;wireess network
security; e-mail secuity; IP security;
intruders; malicious software; firewalls

You might also like