BC4201 Applied Cryptography Syllabus:

BC4201 Applied Cryptography Syllabus – Anna University PG Syllabus Regulation 2021

COURSE OBJECTIVES:

 To understand OSI security architecture and classical encryption techniques.
 To acquire fundamental knowledge on the concepts of finite fields and number theory.
 Understand various block cipher and stream cipher models.
 Describe the principles of public key cryptosystems, hash functions and digital signature
 Acquire fundamental knowledge on applications of Digital Signature in payments etc.,

UNIT I MATHEMATICAL FOUNDATION AND NUMBER THEORY

Definitions – Cryptography, cryptanalysis, cryptology, classical cryptosystem- shift cipher, affine cipher, vigenere cipher, substitution, transposition techniques, Types of attacks in OSI security architecture-Number Theory concepts – Modular Arithmetic , Properties, Euclidean algorithm, Fermat’s and Euler’s theorem, Chinese Remainder Theorem, Primitive roots, Discrete Logarithms, Computational aspects, finite fields, Primes and unique factorization of integers, Computing discrete logarithms

UNIT II BLOCK CIPHERS AND MODES OF OPERATIONS

Simplified DES – Data Encryption Standard-Block cipher principles-block cipher modes of operationAES-TripleDES-Blowfish-RC5

UNIT III PUBLIC KEY CRYPTOGRAPHY

Principles and characteristics – Need for public key cryptography – Primality Testing – Miller Rabin Test – Diffie Hellman Key Exchange-MITM Attack – RSA, Fast Modular Exponentiation Algorithms, Random Number Generation – Finite Fields–Polynomial Arithmetic-ECC –Key Management

UNIT IV HASH FUNCTIONS AND DIGITAL SIGNATURE

Authentication requirement – Authentication function – MAC – Hash function – Security of hash function and MAC – MD5 – SHA – HMAC – CMAC – Digital signature and authentication protocols – DSS – EI Gamal – Schnorr – Blind Signatures for unreachable payments

UNIT V APPLICATIONS OF CRYPTOGRAPHIC ALGORITHMS

Authentication – Kerberos , Zero Knowledge Proofs, System Security – Firewalls, Types, Design considerations, Intrusion Detection Systems, IP Security – IPSec (AH and ESP),Web Security – SSL, TLS, Electronic passports and ID cards – SDA/DDA/CDA Bank Cards, Secure Electronic Transaction, Crypto currencies – Bitcoin, Email Security – PGP, Tor (The Onion Router).

TOTAL:45 PERIODS

PRACTICALS:

1. Demonstration of Symmetric conventional cryptographic techniques
2. Demonstration of Symmetric classic cryptographic techniques
3. Demonstration of Asymmetric cryptographic techniques
4. Demonstration of Hashing and Message digest techniques
5. Design and implementation of new cryptographic algorithms
6. Demonstration and Implementation of secure communication using standard crypto libraries (OpenSSL, NTL, GMP)
7. Implementation of smart card based server/client applications
8. Demonstration of authentication techniques
9. Developing cryptographic algorithms for industrial applications
10. Developing cryptographic algorithms for innovative applications

TOTAL:30 PERIODS

COURSE OUTCOMES:

CO1: Compare various Cryptographic Techniques
CO2: Understand security issues, practices and principles in various applications
CO3: Learn to analyse the security of the in-built cryptosystems
CO4: Develop cryptographic algorithms for information security
CO5: Develop authentication schemes for identity and membership authorization

TOTAL: 75 PERIODS

REFERENCES

1. Bruce Schneier and Neils Ferguson, “Practical Cryptography”, First Edition, Wiley Dream tech India Pvt Ltd, 2003.
2. J. H. Silverman, A Friendly Introduction to Number Theory, 4th Ed. Boston: Pearson, 2019 (ISBN No.: 978 9353433079, 935343307X
3. Charlie Kaufman, Radia Perlman and Mike Speciner, “Network Security : Private Communications in a Public World”, Prentice Hall of India, Second Edition, 2016. (UNIT V)
4. Douglas R Stinson and Maura B. Paterson, “Cryptography – Theory and practice”, Fourth Edition, CRC Press,2018 (UNIT -I)
5. William Stallings, Cryptography and Network Security, Seventh Edition, Pearson Education, 2017. (UNIT I,II,III,IV)