Unit – I
Cryptography – Terminology, Steganography, Substitution ciphers and transposition ciphers, one – time pads.
Cryprographic protocols – Introduction, Communication using Symmetric cryptography, one-way hash functions, communication using public-key cryptography, Hybrid cryptosystems, Digital Signatures, Digital Signatures with encryption, Random and Psuedo random sequence generation
Basic Protocols – Key Exchange, Authentication, Authentication and Key exchange, Formal analysis, Secret splitting, Secret sharing, Cryptographic protection of databases
Unit - II
Intermediate Protocols – Time stamping, Subliminal channel, Signatures, Bit commitment, Fair-Coin flops, mental poker, Key Escrow
Advanced Protocols – Zero knowledge proofs, Blind signatures, Identity based Public-key cryptography Oblivious transfer, Simultaneous contract signing, Digital Certified mail, Simultaneous exchange of secrets. Esoteric Protocols – Secret Electronics, Security multiparty computation, Anonymous Message broadcast, Digital Cash
Unit – III
Key Length – Symmetric Key length, Public-Key length Key management – Generation, Transfer, Verification, Use, Store, Backup, lifetime, destruction, Public Key Management
Algorithms types and Modes – Electronic codebook, Block reply, Cipher Block Chaining, Steam Ciphers, Self-Synchronizing, Cipher-feedback, Synchronous Stream, Out-put feedback, Counter mode, Choosing a Cipher mode, Comparison. Using Algorithms – Choosing an algorithm, Public Key Versus Symmetric, Encrypting communication channels, Encrypting data for storage, Hardware Encryption Versus Software.
Unit – IV Information Theory, Complexity theory, Number Theory, Factoring, Prime Number generation DES – Background, Description, Security of DES, Differential and linear Cryptanalysis, DES variants Psuedo Random Sequence generators – linear congrential, linear feed-back shift registers Stream Ciphers – Design and Analysis, Stream Cypher using LFSRs
Unit – V
One – Way Hash functions – Background, MD5, SHA Public – Key Algorithms – Background, RSA Digital Signature Algorithm Diffie-Hellman Algorithm for key exchange Implementation Examples – IBM, ISDN, Kerberos, ISO authentication framework, PEM,PKCS, UEPs.
Suggested reading : Bruce Schneier – Applied Cryptography, Wiley 2001
References: William Stallings – Cryptography and Network Security, PH
|