Syllabus - CRYPTOGRAPHY AND SECURITY
Syllabus - CRYPTOGRAPHY AND SECURITY
Syllabus - CRYPTOGRAPHY AND SECURITY
L: T: P(Hours/Week)
Credits:3 Total Contact Hours:45 Max. Marks:100
3: 0: 0
Pre-requisites
Nil
Course Objectives
Block Cipher Structure – The Data Encryption Standard – DES Example – The strength of DES
– Block Cipher Design Principles – AES Structure – AES transformation - AES example –
Mode of Operations
Principles of Public – Key Cryptosystems – The RSA Algorithm – Diffie – Hellman Key
Exchange – The Algorithm – Key Exchange Protocols – Man-in-the-Middle Attack -
Elgamal Cryptographic System - Elliptic Curve Cryptography.
Text Book(s):
T1. William Stallings “Cryptography And Network Security Principles And Practice”, 7 th Edition,
Pearson Education.
T2. Mayank Bhushan, Rajkumar Singh Rathore, Aatif Jamshed, “Fundamentals of
Cyber Security (Principles, Theory and Practices) ” BBP Publications, First Edition
Reference
2017. Book(s):
R1. Wenbo Mao, “Modern Cryptography: Theory and Practice”, Prentice Hall PTR.
R2. William Stallings, “Network Security Essentials: Applications and Standards”, Pearson Education,
2001.
Course Articulation Matrix
CO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO1
2
CO1 3 2 1 1 - 1 - 1 1 1 1 2
CO2 3 2 1 1 - 1 - 1 1 1 1 2
CO3 3 2 1 1 - 1 - 1 1 1 1 2
CO4 3 2 1 1 - 1 - 1 1 1 1 2
CO5 3 2 1 1 - 1 - 1 1 1 1 2
L: T: P(Hours/Week)
Credits:2 Total Contact Hours:60 Max. Marks:100
0: 0: 4
Pre-requisites
C / Python Programming
Course Objectives
List of Exercises
1. Write a program to implement the following cipher techniques to perform encryption and
decryption i. Caesar Cipher 85 ii. Playfair Cipher iii. Hill Cipher
2. Write a program to implement the following transposition techniques (i) Rail fence technique
– Row major transformation (ii) Rail fence technique - Column major transformation
7. Write a program to calculate the message digest of a text using the SHA-1 algorithm
8. Write a program to calculate the message digest of a text using the MD-5 algorithm.
Reference Book(s):
R1. Behrouz A Forouzan and Debdeep Mukhopadhyay, “Cryptography and Network Security”,
3rd Edition, Tata McGraw Hill, New Delhi, 2016.
R2. Atul Kahate, “Cryptography and Network Security”, 3rd Edition, Tata Mcgraw Hill, New R3.
Douglas R Stinson, “Cryptography - Theory and Practice”, Chapman and Hall / CRC Press,
R3. Douglas R Stinson, “Cryptography - Theory and Practice”, Chapman and Hall / CRC Press
Web Reference(s):
1. NPTEL Course contents on Cryptography and Network Security
URL:http://nptel.ac.in/courses/106105162/
2. Learn Internet Security at Tutorial point
https://www.tutorialspoint.com/cryptography/index.htm
3. Khan Academy Course on cryptography
https://www.khanacademy.org/computing/computer-science/cryptography
CO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 1 1 2 1 2 - - - 2 - -
CO2 2 2 1 2 2 2 - - - 2 - -
CO3 2 3 1 2 2 2 - - - 2 - -
CO4 2 2 1 2 2 2 - - - 2 - -