CA Syllabus
CA Syllabus
CA Syllabus
Year of
Category L T P Credit
CST CRYPTOGRAPHIC Introduction
393 ALGORITHMS
VAC 3 1 0 4 2019
Preamble:
Course Outcomes: After the completion of the course the student will be able to
Identify the security services provided for different types of security attacks.
CO1
(Cognitive Knowledge Level : Understand)
PO PO1 PO1
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO11
9 0 2
CO1
110
COMPUTER SCIENCE AND ENGINEERING
CO2
CO3
CO4
CO5
Assessment Pattern
111
COMPUTER SCIENCE AND ENGINEERING
age)
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
Analyze
Evaluate
Create
Mark Distribution
Attendance : 10 marks
First Internal Examination shall be preferably conducted after completing the first half of the
syllabus and the Second Internal Examination shall be preferably conducted after completing
remaining part of the syllabus.
112
COMPUTER SCIENCE AND ENGINEERING
There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions
each from the completed modules and 1 question from the partly covered module), having 3
marks for each question adding up to 15 marks for part A. Students should answer all questions
from Part A. Part B contains 7 questions (preferably, 3 questions each from the completed
modules and 1 question from the partly covered module), each with 7 marks. Out of the 7
questions in Part B, a student should answer any 5.
There will be two parts; Part A and Part B. Part A contains 10 questions with 2 questions from
each module, having 3 marks for each question. Students should answer all questions. Part B
contains 2 questions from each module of which a student should answer any one. Each question
can have maximum 2 sub-divisions and carries 14 marks.
Syllabus
Need for security, Security approaches, Principles of security, Types of attacks, OSI Security
Architecture, Classical encryption techniques - Substitution techniques, Transposition
techniques. Stream cipher, Block cipher, Public key cryptosystems vs. Symmetric key
cryptosystems, Encrypting communication channels.
Overview of symmetric key cryptography, Block cipher principles, Data Encryption Standard
(DES), Differential and Linear cryptanalysis, Double DES, Triple DES, International Data
Encryption Algorithm (IDEA), Advanced Encryption Algorithm (AES),Block cipher modes of
operation, Stream cipher, RC4.
Principles of public key cryptosystems, RSA algorithm, RSA illustration, Attacks, ElGamal
cryptographic system, Knapsack algorithm, Diffie-Hellman key exchange algorithm, Elliptical
curve cryptosystems.
Symmetric key distribution using symmetric encryption, Symmetric key distribution using
asymmetric encryption, Distribution of public keys, Generating keys, transferring keys,
Verifying keys, Updating keys, Storing keys, Backup keys, Compromised keys, Public key
infrastructure.
113
COMPUTER SCIENCE AND ENGINEERING
Module – 5 (Authentication)
Text Books
1. William Stallings, Cryptography and Network Security Principles and Practice, Pearson
Edu, 6e.
2. Bruice Schneier, Applied Cryptography Protocols, Algorithms and source code in C,
Wiley,2e.
References
2. Discuss the different security services provided for preventing security attacks.
114
COMPUTER SCIENCE AND ENGINEERING
2. Write an algorithm for the InvSubBytes transformation and implement using python
(Assignment)
3. Consider the following elliptic curve signature scheme. We have a global elliptic curve,
prime p, and “generator” G. Alice picks a private signing key XA and forms the public
verifying YA = XAG. To sign a message M:
• Alice picks a value k
• Alice sends Bob M, k and the signature S = M - kXAG.
• Bob verifies that M=S+kYA.
Show that the verification process produces an equality if the signature is valid.
4. Write an algorithm to add two points on an elliptic curve over GF(p) and implement using
Python. (Assignment)
5. Write an algorithm for encryption using knapsack cryptosystem and implement using Java.
(Assignment)
Course Outcome4 (CO4):
1. List four general categories of schemes for the distribution of public keys.
2. What are the essential ingredients of a public-key directory?
Course Outcome 5 (CO5):
1. State the value of the length field in SHA-512 if the length of the message is 1919 bits and
1920 bits.
2. Write an algorithm in pseudo code for HMAC and implement using Python (Assignment)
115
COMPUTER SCIENCE AND ENGINEERING
PART A
2. Define Substitution Cipher. Encrypt using one time pad M = HONORS and K =
CIPHER.
5. Perform encryption using RSA Algorithm for the following p=7; q=11; e=13;
M=5.
116
COMPUTER SCIENCE AND ENGINEERING
(10x3=30)
Part B
(Answer any one question from each module. Each question carries 14
Marks)
11. (a)
With a neat sketch, Explain OSI Security architecture model.
(8)
(b)
How does link encryption differ from end-to-end encryption? Explain.
(6)
OR
12. (a)
Encrypt the text “cryptography” using the Hill Cipher with the key
9 4
(8)
5 7 . Show the calculations.
(b) Illustrate the steps involved in encrypting a plain text using playfair cipher
(6)
with an example.
13. (a)
With a neat sketch, explain a single round in DES.
10
(b)
Explain encryption and decryption using 2 keys and 3 keys of triple DES.
(4)
OR
14. (a) Explain the block cipher modes i) Cipher feedback mode ii) Output
(8)
feedback mode.
15. (a) Write an algorithm for generating public and private key using Elliptical
(10)
curve cryptography.
117
COMPUTER SCIENCE AND ENGINEERING
(b) The equation y2=x3 +x+1, the calculation is done modulo 13. Add two
(4)
points R= P+Q, where P= (4,2) and Q= (10,6).
OR
16. User A and B use the Diffie-Hellman key exchange technique with a
common prime q=71 and primitive root alpha=7.
(a) If user A has private key XA =3, What is A’s public key YA? (7)
(b) If user B has private key XB =6, What is A’s public key YB? (7)
17. (a) Define a session key and show how a KDC can create can create a session
(7)
key between Alice and Bob.
(b) What are the requirements for the use of a public-key certificate scheme? (7)
OR
18. (a) What are the core components of a PKI? Briefly describe each component. (8)
(b) Describe the following (i) Updating keys (ii) Compromised Keys. (6)
19. (a) Describe how SHA-512 logic produce message digest (10)
OR
20. (a) Specify the format for X.509 certificate. Explain the steps required to obtain
(7)
user’s certificate.
(b) With suitable block diagrams, explain the types of functions that may be
(8 )
used to produce an authenticator.
118
COMPUTER SCIENCE AND ENGINEERING
Teaching Plan
No of Lecture
No Contents
Hrs
119
COMPUTER SCIENCE AND ENGINEERING
120
COMPUTER SCIENCE AND ENGINEERING
121