crypto hand out

Upload: savya-mittal

Post on 04-Jun-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/13/2019 Crypto Hand Out

    1/2

    Birla Institute of Technology and Science, Pilani - K.K. Birla Goa Campus

    Second Semester, 2013-14Course Handout (Part-II)

    In addition to part I (General Handout for all courses appended to the time table) this portion gives fur-

    ther specific details regarding the course.

    Course Title: Cryptography Course No.:BITS C463

    Instructor-in-charge:Dr. S.K. Sahay Chamber No.: A-407

    Objective:

    A comprehensive introduction to applied cryptography for the understanding of how cryptographic

    schemes works. The course aims to prepare the students for taking more rigorous and specialized courses

    in this and related fields.

    Course Description:

    The course will provide a comprehensive introduction to applied cryptography, suited to students

    and practitioners in industry. The necessary mathematical concepts will be introduce in a way that stu-

    dents with a minimum calculus background will understand. Focus will be on practical relevance by

    introducing most crypto algorithms that are used in modern real-world applications. The important issue

    of software and hardware implementation for the algorithm will be discuss. Also, lightweight ciphers,

    important cryptographic protocols, modes of operation, security services will be taught.

    Text Book:

    T1: Applied Cryptography, John Wiley & Sons, 2nd Edition, 2006.Bruce Schneier.

    Reference Books:

    R1: Cryptography and Network Security, 4th Edition, 2006, Pearson Education.William Stallings.

    R2: An Introduction to Cryptography, Chapman & Hall/CRC, 2nd Edition, 2007.Richard A. Mollin.

    R3: Introduction to Cryptography, Springer, 2nd Edition, 2004.Johannes Buchmann.

    Evaluation:

    Component Nature Examination Date Weightage

    Test-I Closed Book 18/09/2013 30%

    Test-II Closed Book 28/10/2013 25%

    Comprehensive Test Open Book 03/12/2013 45%

    P.T.O

  • 8/13/2019 Crypto Hand Out

    2/2

    Course Plan:

    L. No. Topics References

    1 - 3

    Basics of cryptography, Simple symmetric encryption, General

    thoughts on breaking cryptosystems, Modular arithmetic, Groups,

    Integer rings and some historical ciphers.

    T1: 1.1, 1.3-1.5; R1:

    4.1, 4.2; Class notes

    4 - 6

    Encryption and decryption of stream ciphers, Random numbers,

    Cryptographically secure pseudo random number generators, Onetime pad, Linear feedback shift register, Trivium.

    T1: 1.5, 9.4, 9.5, 9.7,

    16.1-16.4; R1: 7.4;Class notes

    7 - 10

    Fiestel ciphers, Encryption, Decryption, Security and Imple-

    mentations of Data Encryption Standard (DES), 3DES, DESX,

    Lightweight cipher.

    T1: 12.1-12.3, 15.1-

    15.3; Class notes

    11 - 14 Galois fields, Internal structure of Advance Encryption Standard

    (AES), Security and implementation of AES.

    R1: 4.3-4.6, 5.1-5.2;

    Class notes

    15 - 17 Modes of operations of block ciphers: ECB, CBC, OFB, CFB,

    CTR, Enhancing the security of block ciphers,

    T1: 9.3, 9.6, 9.8, 9.9;

    Class notes

    18 - 22

    Hash functions from block ciphers, MD4 family, Secure hash al-

    gorithm, SHA-I, Message authentication codes from hash func-

    tions and block ciphers, Galois counter message authentication

    code.

    T1: 18.1, 18.7, 18.10,

    18.11; R1: 12.3;

    Class notes

    23 - 25 Aspects of Public-key cryptography, Relevant number theory for

    public-key algorithms.

    T1: 11.3-11.5; R1:

    8.1-8.4; Class notes

    26 - 28 Encryption, decryption, efficiency & correctness of RSA, Prime

    numbers, RSA in practice and attacks.

    T1: 19.3; R1: 9.1-9.2;

    Class notes

    29 - 31

    Diffe-Hellman key exchange and its security issues, Discrete log-

    arithm problem, Elgamal encryption scheme.

    T1: 19.6; R1: 10.1-

    10.2; Class notes

    32 - 34 Elliptic curve cryptosystem, Discrete logarithm problem with el-

    liptic curves, Diffe-Hellman key exchange with elliptic curve.

    T1: 19.8; R1: 10.3-

    10.4; Class notes

    35 - 37 Principles of digital signatures, RSA, Elliptic curve and Elgamal

    digital signature scheme, Digital signature algorithm.

    T1: 20.1, 20.4 R1:

    13.1-13.3, Class notes

    38 - 40 Qunatum Cryptography Class notes

    41 Conclusion and Summary.

    Make-up policy: Make-up will be granted strictly on prior permission and on justifiable groundsonly.

    Course notices:All notices for this course will be display on CS & IS notice board and/or ftp://10.1.1.223/.

    Consultation hours: Will be announced in the class.

    Instructor-in-Charge

    BITS C463