[vc_row el_class=”inner-body-content” css=”.vc_custom_1666782260148{padding-top: 30px !important;padding-bottom: 20px !important;}”][vc_column][vc_custom_heading text=”Pre-requisite(s)” font_container=”tag:h3|font_size:20px|text_align:left” use_theme_fonts=”yes” css=”.vc_custom_1666782238431{margin-top: 0px !important;}”][vc_column_text]None[/vc_column_text][vc_custom_heading text=”Recommended Book(s)” font_container=”tag:h3|font_size:20px|text_align:left” use_theme_fonts=”yes”][vc_column_text]
- Cryptography And Network Security
(William Stallings) 4th / 5th Edition
[/vc_column_text][vc_custom_heading text=”Reference Book(s)” font_container=”tag:h3|font_size:20px|text_align:left” use_theme_fonts=”yes”][vc_column_text]
- An Introduction To Mathematical Cryptography
(J. Hoffstein, Pipher, Silverman) Springer
- A Handbook Of Applied Cryptography
J Menezes, Paul C. Van Oorschot, Scott A. Vanstone - Applied Cryptography
(Bruce Schneier)
[/vc_column_text][vc_custom_heading text=”COURSE OBJECTIVES” use_theme_fonts=”yes”][vc_column_text]The focus of this course will be on how the cryptographic techniques and protocols can be used to can be used to secure the most valuable asset ‘information’ when it is transmitted electronically over a public network.[/vc_column_text][vc_custom_heading text=”COURSE LEARNING OUTCOMES (CLO)” use_theme_fonts=”yes”][vc_column_text]After completing this course, students will be able to
• Understand meaning of cryptography and cryptanalysis
• Learn mathematical concepts in number theory, algebra and complexity theory that are applied to modern cryptographic algorithms
• Explain various cryptographic methods like Private Key Encryption, Public Key Encryption, Hash Functions, Digital Signatures, Pseudo Random Numbers, Key Management, Message Authentication etc.[/vc_column_text][vc_custom_heading text=”COURSE CONTENTS” use_theme_fonts=”yes”][vc_column_text css=”.vc_custom_1666782224725{margin-bottom: 0px !important;}”]
- Introduction and Motivation, Cryptography and Cryptanalysis
- Classical Encryption Methods
- Number theory, Modular Arithmetic
- Block Cipher, DES
- Finite Fields
- Private Key Encryption Methods, AES, Triple DES, RC4
- Key Management, Confidentiality using Symmetric Keys
- Prime Numbers, Primality Test
- Public Key Encryption Methods, RSA
- Discrete Logarithm Problem, ElGamal Cryptosystem
- Hash Functions, Digital Signatures, Authentication Protocols
- Elliptic Curve Cryptography
- NP-Hard Problems, Algebraic Cryptography, an overview
[/vc_column_text][/vc_column][/vc_row]