BC4201 Applied Cryptography Syllabus:
BC4201 Applied Cryptography Syllabus – Anna University PG Syllabus Regulation 2021
COURSE OBJECTIVES:
To understand OSI security architecture and classical encryption techniques.
To acquire fundamental knowledge on the concepts of finite fields and number theory.
Understand various block cipher and stream cipher models.
Describe the principles of public key cryptosystems, hash functions and digital signature
Acquire fundamental knowledge on applications of Digital Signature in payments etc.,
UNIT I MATHEMATICAL FOUNDATION AND NUMBER THEORY
Definitions – Cryptography, cryptanalysis, cryptology, classical cryptosystem- shift cipher, affine cipher, vigenere cipher, substitution, transposition techniques, Types of attacks in OSI security architecture-Number Theory concepts – Modular Arithmetic , Properties, Euclidean algorithm, Fermat’s and Euler’s theorem, Chinese Remainder Theorem, Primitive roots, Discrete Logarithms, Computational aspects, finite fields, Primes and unique factorization of integers, Computing discrete logarithms
UNIT II BLOCK CIPHERS AND MODES OF OPERATIONS
Simplified DES – Data Encryption Standard-Block cipher principles-block cipher modes of operationAES-TripleDES-Blowfish-RC5
UNIT III PUBLIC KEY CRYPTOGRAPHY
Principles and characteristics – Need for public key cryptography – Primality Testing – Miller Rabin Test – Diffie Hellman Key Exchange-MITM Attack – RSA, Fast Modular Exponentiation Algorithms, Random Number Generation – Finite Fields–Polynomial Arithmetic-ECC –Key Management
UNIT IV HASH FUNCTIONS AND DIGITAL SIGNATURE
Authentication requirement – Authentication function – MAC – Hash function – Security of hash function and MAC – MD5 – SHA – HMAC – CMAC – Digital signature and authentication protocols – DSS – EI Gamal – Schnorr – Blind Signatures for unreachable payments
UNIT V APPLICATIONS OF CRYPTOGRAPHIC ALGORITHMS
Authentication – Kerberos , Zero Knowledge Proofs, System Security – Firewalls, Types, Design considerations, Intrusion Detection Systems, IP Security – IPSec (AH and ESP),Web Security – SSL, TLS, Electronic passports and ID cards – SDA/DDA/CDA Bank Cards, Secure Electronic Transaction, Crypto currencies – Bitcoin, Email Security – PGP, Tor (The Onion Router).
TOTAL:45 PERIODS
PRACTICALS:
1. Demonstration of Symmetric conventional cryptographic techniques
2. Demonstration of Symmetric classic cryptographic techniques
3. Demonstration of Asymmetric cryptographic techniques
4. Demonstration of Hashing and Message digest techniques
5. Design and implementation of new cryptographic algorithms
6. Demonstration and Implementation of secure communication using standard crypto libraries (OpenSSL, NTL, GMP)
7. Implementation of smart card based server/client applications
8. Demonstration of authentication techniques
9. Developing cryptographic algorithms for industrial applications
10. Developing cryptographic algorithms for innovative applications
TOTAL:30 PERIODS
COURSE OUTCOMES:
CO1: Compare various Cryptographic Techniques
CO2: Understand security issues, practices and principles in various applications
CO3: Learn to analyse the security of the in-built cryptosystems
CO4: Develop cryptographic algorithms for information security
CO5: Develop authentication schemes for identity and membership authorization
TOTAL: 75 PERIODS
REFERENCES
1. Bruce Schneier and Neils Ferguson, “Practical Cryptography”, First Edition, Wiley Dream tech India Pvt Ltd, 2003.
2. J. H. Silverman, A Friendly Introduction to Number Theory, 4th Ed. Boston: Pearson, 2019 (ISBN No.: 978 9353433079, 935343307X
3. Charlie Kaufman, Radia Perlman and Mike Speciner, “Network Security : Private Communications in a Public World”, Prentice Hall of India, Second Edition, 2016. (UNIT V)
4. Douglas R Stinson and Maura B. Paterson, “Cryptography – Theory and practice”, Fourth Edition, CRC Press,2018 (UNIT -I)
5. William Stallings, Cryptography and Network Security, Seventh Edition, Pearson Education, 2017. (UNIT I,II,III,IV)