DS4008 Cryptographic Techniques Syllabus:

DS4008 Cryptographic Techniques Syllabus – Anna University PG Syllabus Regulation 2021

COURSE OBJECTIVES:

 To understand about encryption and key generation techniques
 To learn about Authentication and security measures
 To understand various attacks present over encryption and authentications techniques
 To study security system and wireless security analysis

UNIT I OVERVIEW OF ENCRYPTION AND CIPHER

Overview: Classical Encryption – Substitution Cipher – One-time-pad Encryption – Block Ciphers – DES – Key Recovery Attacks on Block Ciphers – Iterated-DES and DESX – AES – Limitations of Key- recovery based Security – Contemporary Symmetric Ciphers – Confidentiality using Symmetric Encryption.

UNIT II PUBLIC-KEY ENCRYPTION, HASH FUNCTIONS AND MESSAGE AUTHENTICATION

Introduction: Public-Key Cryptography and RSA – Key Management – Diffie-Hellman Key Exchange – Elliptic Curve Cryptography – Hash Functions – Hash Algorithms – Hash Function SHA1 – Collision resistant Hash Functions – Collision Finding Attacks – MD Transform – Syntax for message Authentication – PRF as a MAC Paradigm – CBC MAC – Universal-hashing Approach – Authenticated Encryption – Digital Signatures and Authentication Protocols

UNIT III NETWORK SECURITY PRACTICE

Authentication Applications – Kerberos – X.509 Authentication Service – Electronic mail Security – Pretty Good Privacy – S/MIME – IP Security architecture – Authentication Header – Encapsulating Security Payload – KeyManagement – Digital cash – Schnorr’s Identification protocol and Signature – Blind Signature – Distributed Ledger bitcoin – Secret Sharing – Shamir threshold scheme – Security in routing – Mixnet

UNIT IV SYSTEM SECURITY TECHNIQUES

Intruders – Intrusion Detection – Password Management – Malicious Software – Firewalls – Firewall Design Principles – Trusted Systems.

UNIT V WIRELESS SECURITY TECHNIQUES

Introduction to Wireless LAN Security Standards – Wireless LAN Security Factors and Issues. Hacking Attacking 802.11i wireless technologies- Hacking hotspots, client attacks resources, threats of Bluetooth advanced attacks.

TOTAL:45 PERIODS

COURSE OUTCOMES:

CO1:Demonstrate the various classical encryption techniques and the adversary capabilities.
CO2:To be able to present Encryption techniques and key generation techniques
CO3:Has practice in Authentication and security measures
CO4:Having exposure of network, security system and wireless security standards
CO5: Having coverage of wireless security standards

REFERENCES

1. AtulKahate, “Cryptography and Network Security”, Tata McGraw Hill, 2003
1. Bruce Schneier, “Applied Cryptography”, John Wiley and Sons Inc, 2001.
2. Charles B. Pfleeger, Shari Lawrence Pfleeger, “Security In Computing”, 3rdEdition, PearsonEducation, 2003.
3. Mao, “Modern Cryptography: Theory and Practice” , First Edition, Pearson Education, 2003.
4. Stewart S. Miller, “Wi-Fi Security”, McGraw Hill , 2003.
5. William Stallings, “Cryptography And Network Security – Principles And Practices”, Pearson Education, 3rd Edition, 2003.
6. MihirBellare and Phillip Rogaway, “Introduction to Modern Cryptography”,2005.
7. Jonathan Katz and Yehuda Lindell, “Introduction to Modern Cryptography”, Chapman and Hall, CRC Press Second Edition,2015.
8. Hans Delfts and Helmut Knebl, “Introduction to Cryptography – Principles and Applications”, Springer, Third Edition,2015.
9. Wolfgang Osterhage, “Wireless Security”, CRC Press, 2011.
10. Michael E.Whitman and Herbert J.Mattord, “Principles of Information Security,” Cengage Learning, 4th Edition, 2011.