You are on page 1of 2

Course Title: Introduction to Cryptography

Credit Structure : (L-T-P-Cr): (3-0-0-3)


Course Code: SC402
Program/ Semester: B.Tech, Semester VI
Category: Elective
Prerequisite: Groups and Linear Algebra
Course objective: After successfully completing the course students should be
able to
1. Learn basic Cryptographic concepts and methods
2. Apply the mathematical theories of underlying Cryptographic algorithms
3. Implement Cryptographis techniques and tools to build secure systems

Course content:
Classical cryptography: Caesar cipher, substitution, transposition, cryptanalysis of
the substitution cipher , Vignere cipher, homophonic substitution cipher,
cryptanalysis of the Vignere cipher, ADFGVX cipher, Enigma and its
cryptanalysis , one-time pad, key distribution problem, Diffie-Hellman’s solution,
m-sequence, linear feedback shift registers, designing m-sequences

Mathematical foundations: divisibility, division algorithm


Euclidean GCD algorithm and its run-time analysis, fundamental theorem of
arithmetic , Euclid’s theorem and its proof, sieve of Eratosthenes, congruence,
complete residue system, Euler’s totient function, Chinese Remainder Theorem
Euler’s theorem and its proof, Fermat’s theorem and its proof, fast exponentiation,
Carmichael numbers, discrete log, SQRT problem

introduction to public-key cryptography ,Diffie-Hellman key exchange, RSA


public key cryptosystem, Digital signatures , Rabin public key cryptosystem,
Diffie-Hellman problem, Generalized Diffie-Hellman problem, ElGamal public
key cryptosystem and signature scheme
block ciphers, stream ciphers, pseudorandom bit generators, testing for
pseudorandomness, designing a cryptographically secure pseudorandom bit
generator, Blum-Blum-Shub generator

primitive polynomials, finite fields , Integer factorization algorithms , Primality


testing algorithms , Discrete log algorithms
Suggested textbook/references:
Text Books

1. Topics in Algebra by I. N. Herstein, Second Edition, Wiley India


2. Introduction to Cryptography with Coding Theory, Trappe, Washington,
Pearson Education, 2007
3. Cryptography with Network Security: Principles and Practice, William
Stallings, Pearson Education, 2006

References

1 Handbook of Applied Cryptography by Alfred J. Menezes, Paul C. Van


Oorschot and Scott A. Vanstone. CRC Press , 1996
2 Cryptography: Theory and Practice, Douglas Robert Stinson. Chapman &
hall / CRC , 1995

Grading Policy

Midsem 40%
Endsem 50%
Attendance 10%

You might also like