You are on page 1of 2

PARUL UNIVERSITY - Faculty of Engineering and Technology

Department of Computer Science & Engineering


SYLLABUS FOR 5th Sem BTech PROGRAMME
Cryptography

Type of Course: BTech


Prerequisite: Group Theory, Number Theory, Abstract Algebra and Statistics
Rationale: Cryptography is the study of secure communications techniques that allow only the
sender and intended recipient of a message to view its contents.

Teaching and Examination Scheme:

Teaching Scheme Examination Scheme


Credit External Internal Total
Lect Hrs/ Tut Hrs/ Lab Hrs/
T P T CE P
3 0 0 3 60 - 20 20 - 100
Lect - Lecture, Tut - Tutorial, Lab - Lab, T - Theory, P - Practical, CE - CE, T - Theory, P - Practical

Contents:
Teaching
Sr. Topic Weightage
Hrs.
Introduction:

Computer Security Concept, The OSI Security Architecture, Security


1 Attacks, Security Services, Security Mechanism, A Model for Network 7% 3
Security,

Classical Encryption Techniques:

Symmetric Cipher Model, Cryptanalysis, Cryptanalysis Attacks,


2 Substitution Techniques: Caesar Cipher, Monoalphabetic Cipher, Hill 18% 8
Cipher, Playfair Cipher, Polyalphabetic Cipher, OTP, Transposition
Techniques, Steganography
Block Ciphers and the Data Encryption Standard:

Stream ciphers and block ciphers, Confusion & Diffusion, Block Cipher
3 Principles, Data Encryption Standard (DES), Deferential and Linear 15% 8
Cryptanalysis, Avalanche Effect, strength of DES, Design principles of
block cipher, RC4.
Multiple Encryption and Triple DES

Multiple encryption and triple DES, Meet in the Middle Attack,


4 Electronic Code Book, Cipher Block Chaining Mode, Cipher Feedback 15% 4
mode, Output Feedback mode, Counter mode
Number theory and Advance Encryption Standard:

The Euclidean Algorithm, Modular Arithmetic, Groups, Rings, and


5 Fields, Finite Fields of the Form GF(p), Polynomial Arithmetic, Advance 15% 8
Encryption Standard(AES): structure, key expansion

Page 1 of 2
Asymmetric Ciphers:

Prime Numbers, Fermat’s and Euler’s Theorems, Testing for Primality


6 Principles of Public-Key Cryptosystems, The RSA Algorithm, Diffie 15% 6
Hellman Key Exchange, Man in the Middle attack

Key Management and Distribution:

Symmetric Key Distribution: Symmetric Key Distribution Using


Symmetric Encryption, Symmetric Key Distribution Using Asymmetric
7 Encryption, Asymmetric Key Distribution: Distribution of Public Keys,
X.509 certificates. Public key infrastructure. 15% 5

*Continuous Evaluation:
It consists of Assignments/Seminars/Presentations/Quizzes/Surprise Tests (Summative/MCQ) etc.

Reference Books:
1. Cryptography and Network Security William Stallings; Pearson Education
2. Cryptography & Network Security Behrouz A. Forouzan; Tata McGraw-Hill
3. Information Security Principles and Practice Deven Shah,; Wiley-India
4. Information Security Principles and PracticeMark Stamp; Wiley IndiaEdition

COURSE OUTCOMES:

After undergoing the course, students will be able to understand


Describe network security services and mechanisms.
1. Symmetrical and Asymmetrical cryptography.
2. Data integrity, Authentication, Digital Signatures.
3. Various network security applications, IPSec, Firewall, IDS, Web security, Email security, and
Malicious software etc

Page 2 of 2

You might also like