Sie sind auf Seite 1von 2

Cryptography and Network Security

Course Code : 14-CS-538


Course Title : Cryptography and Network Security
L-T-P : 3-0-0
Credits :3
Prerequisite :

Syllabus:
Basic Cryptographic Techniques: Encryption — Symmetric Techniques: Substitution
Ciphers, Transposition Ciphers, Classical Ciphers: Usefulness and Security, The Data
Encryption Standard (DES), The Advanced Encryption Standard (AES), Confidentiality Modes
of Operation, Key Channel Establishment for Symmetric Cryptosystems. Encryption —
Asymmetric Techniques: Insecurity of "Textbook Encryption Algorithms", The Diffie-Hellman
Key Exchange Protocol, The Diffie-Hellman Problem and the Discrete Logarithm Problem, The
RSA Cryptosystem (Textbook Version), Cryptanalysis Against Public-key Cryptosystems, The
RSA Problem, The Integer Factorization Problem, Insecurity of the Textbook RSA Encryption,
The Rabin Cryptosystem (Textbook Version), Insecurity of the Textbook Rabin Encryption, The
ElGamal Cryptosystem (Textbook Version), Insecurity of the Textbook ElGamal Encryption,
Need for Stronger Security Notions for Public-key Cryptosystems, Combination of Asymmetric
and Symmetric Cryptography, Key Channel Establishment for Public-key Cryptosystems.
Authentication Protocols — Principles: Authentication and Refined Notions, Convention,
Basic Authentication Techniques, Password-based Authentication, Authenticated Key Exchange
Based on Asymmetric Cryptography, Typical Attacks on Authentication Protocols. Hash and
Message Digests: MD5, SHA1, HMAC. Authentication Framework for Public-Key
Cryptography:Directory-Based Authentication, Non-Directory Based Public-key
Authentication Framework. Formal Approaches to Security Establishment- Formal and
Strong Security Definitions for Public-Key Cryptosystems: Introduction, A Formal Treatment
for Security, Semantic Security — the Debut of Provable Security, Inadequacy of Semantic
Security, Beyond Semantic Security. Provably Secure and Efficient Public-Key
Cryptosystems: Introduction, The Optimal Asymmetric Encryption Padding, The Cramer-
Shoup Public-key Cryptosystem, An Overview of Provably Secure Hybrid Cryptosystems.
Formal Methods for Authentication Protocols Analysis: Toward Formal Specification of
Authentication Protocols, A Computational View of Correct Protocols — the Bellare-Rogaway
Model, A Symbolic Manipulation View of Correct Protocols, Formal Analysis Techniques: State
System Exploration, Reconciling Two Views of Formal Techniques for Security. Zero-
Knowledge Protocols: Basic Definitions, Zero-knowledge Properties Proof or Argument,
Protocols with Two-sided-error, Round Efficiency, Non-interactive Zero-knowledge. Network
Security Standards: Kerberos V5, PKI, IPsec: AH and ESP, SSL/TLS, PEM & S/MIME, PGP

Text Books:
1. Modern Cryptography Theory and Practice, Wenbo Mao, Pearson Education 2008
2. Network Security: Private Communication in a Public World, Charlie Kaufman,
Radia Perlman Mike Speciner, Prentice Hall 2/E.( Hash and Message Digests, Unit V)
References:
1. Cryptography and Network Security, William Stallings, 4/E Publisher: Prentice Hall
2. Information Security Principles & Practice, Mark Stamp, WILEY INDIA 2006.
3. Cryptography & Network Security by Behrouz A. Forouzan, TMH 2007.
4. Network Security: The complete reference, Robert Bragg, Mark Rhodes, TMH
5. Computer Security Basics by Rick Lehtinen, Deborah Russell & G.T.Gangemi Sr., SPD
O’REILLY 2006.
6. Network Security Essentials (Applications and Standards) by William Stallings, Pearson
Education.

Das könnte Ihnen auch gefallen