|
Unit � I
Cryptography � Terminology, Steganography, Substitution ciphers and transposition ciphers, one � time pads.
Cryprographic protocols � Introduction, Communication using Symmetric cryptography, one-way hash functions, communication using public-key cryptography, Hybrid cryptosystems, Digital Signatures, Digital Signatures with encryption, Random and Psuedo random sequence generation
Basic Protocols � Key Exchange, Authentication, Authentication and Key exchange, Formal analysis, Secret splitting, Secret sharing, Cryptographic protection of databases
Unit - II
Intermediate Protocols � Time stamping, Subliminal channel, Signatures, Bit commitment, Fair-Coin flops, mental poker, Key Escrow
Advanced Protocols � Zero knowledge proofs, Blind signatures, Identity based Public-key cryptography Oblivious transfer, Simultaneous contract signing, Digital Certified mail, Simultaneous exchange of secrets. Esoteric Protocols � Secret Electronics, Security multiparty computation, Anonymous Message broadcast, Digital Cash
Unit � III
Key Length � Symmetric Key length, Public-Key length Key management � Generation, Transfer, Verification, Use, Store, Backup, lifetime, destruction, Public Key Management
Algorithms types and Modes � Electronic codebook, Block reply, Cipher Block Chaining, Steam Ciphers, Self-Synchronizing, Cipher-feedback, Synchronous Stream, Out-put feedback, Counter mode, Choosing a Cipher mode, Comparison. Using Algorithms � Choosing an algorithm, Public Key Versus Symmetric, Encrypting communication channels, Encrypting data for storage, Hardware Encryption Versus Software.
Unit � IV Information Theory, Complexity theory, Number Theory, Factoring, Prime Number generation DES � Background, Description, Security of DES, Differential and linear Cryptanalysis, DES variants Psuedo Random Sequence generators � linear congrential, linear feed-back shift registers Stream Ciphers � Design and Analysis, Stream Cypher using LFSRs
Unit � V
One � Way Hash functions � Background, MD5, SHA Public � Key Algorithms � Background, RSA Digital Signature Algorithm Diffie-Hellman Algorithm for key exchange Implementation Examples � IBM, ISDN, Kerberos, ISO authentication framework, PEM,PKCS, UEPs.
Suggested reading : Bruce Schneier � Applied Cryptography, Wiley 2001
References: William Stallings � Cryptography and Network Security, PH
|