Sie sind auf Seite 1von 12

DATA SECURITY AND ENCRYPTION

CS465

BOOK:
WILLIAM STALLINGS, “CRYPTOGRAPHY AND NETWORK SECURITY: PRINCIPLES AND PRACTICE”, 6TH EDITION, PEARSON INC. (2014)

REFERENCE BOOKS:
1. JONATHAN KATZ AND YEHUDA LINDELL. INTRODUCTION TO MODERN CRYPTOGRAPHY 2ED.CRC PRESS, 2014.
2. CHRISTOF PAAR AND JAN PELZL. UNDERSTANDING CRYPTOGRAPHY. SPRINGER, 2010.
3. NIGEL SMART. CRYPTOGRAPHY MADE SIMPLE. SPRINGER, 2016.
4. JEAN-PHILIPPE AUMASSON. SERIOUS CRYPTOGRAPHY: A PRACTICAL INTRODUCTION TO MODERN ENCRYPTION. NO STARCH PRESS, 2017.
BIOGRAPHY

• Engr. Dr. Muhammad Waqas (Ph.D. in Information & Communication Engineering)


• Research: Information Theoretic Security, Physical Layer Security, Mobility Management, Fog Computing, Mobile
Edge Computing, Device to Device Communication, Cyber–Security.
• Teaching / Research Experience = 10 years
• Research Contribution: 25 +
• Impact factor = 100+, Citation= 200 & growing
• TA = Najam Ur Rehman
• Offer Projects: Many ideas in Security.
• Expectation from you: Final year projects based Research / Semester Projects based Research.
• Contact: muhammad.waqas@giki.edu.pk, 03339250884 (Please don’t call, text only for course information)
• Office Timing Contact: 9:30AM to 12:30PM & 2:00PM to 4:00PM
COURSE OUTLINES

• Overview
• Computer Security Concept
• The OSI Security Architecture
• Security Attacks
• Security Services
• Security Mechanisms.
• A model for Network Security
PART ONE (SYMMETRIC CIPHERS)

• Classical Encryption Model • Basic Concepts in Number Theory and Finite Felds
• Symmetric Cipher Model
• Divisibility and The Division Algorithm
• Substitution Techniques
• The Euclidean Algorithm
• Transposition Techniques
• Rotor Machines • Modular Arithmetic
• Steganography • Groups, Rings and Fields
• Block Ciphers and data encryption standard • Advance Encryption Standard
• Block Cipher Principles
• The origins AES
• The data encryption standard
• A DES Example • AES Structure
• The Strength of DES • AES Round Functions
• Differential and Liner Cryptanalysis • AES key expansion
• Block Cipher Design Principles
• AES Implementation
PART ONE (SYMMETRIC CIPHERS)

• Block Cipher Operation • Pseudorandom Number Generation and


• Multiple Encryption and Triple DES Stream Ciphers
• Electronic Codebook Mode • Principles of Pseudorandom Number
• Cipher Block Chaining Mode Generation.

• Cipher Feedback Mode • Pseudorandom Number Generation

• Counter Mode • Pseudorandom Number Generation


Using a Block Cipher
• XTS Mode for Block-Oriented Storage
Devices • Stream Cipher
PART TWO ASYMMETRIC CIPHERS

• More Number Theory • Other PKC


• Prime Numbers • Diffie-Hellman Key Exchange
• Fermat’s and Euler’s Theorems • EIGamal Cryptosystem
• Testing for Primality • Ellipitic Curve Arithmetic
• The Chinese Remainder Theorem • Elliptic Curve Cryptography
• Discrete Logarithms
• Public Key Cryptography (PKC)
• Principles
• RSA algorithms
MID - TERM

• Mid-Term Exam • Tools (Not restricted)


• Practical Implementation • MATLAB
• Encryption & Decryption • PYTHON
• Symmetric & Asymmetric
• Algorithms & Techniques
• RSA
Diffie-Hellman and so on
PART THREE: CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS

• Cryptographic Hash Function • MA codes

• Applications • MAC based on Hash function

• Two Simple Hash Function • MAC based on Block Ciphers: DAA and CMAC

• Requirements and Security • Digital Signatures


• Hash Functions based on Cipher Block Chaining
• EIGamal Digital Signature Scheme
• Hash Algorithms
• Schnorr Digital Signature Scheme
• Message Authentication Codes
• MA requirements • Digital Signature Standard
• MA functions

• Red = Implementation (Comparison)


PART FOUR: MUTUAL TRUST

• Key Management and • User Authentication Protocols


Distribution • Remote User Authentication Principles
• SKD using SE • Remote User Authentication Using SE
• SKD using ASE • Remote User Authentication Using ASE
• Distribution of Public Keys • Federated Identity Management
• Public Key Infrastructure
PART FIVE: NETWORK AND INTERNET SECURITY

• Transport-Level security • Electronic Mail Security


• Web Security Issues • Pretty Good Privacy
• Secure Sockets Layer (SSL) • Domain Keys Identified Mail
• Transport Layer Security (TLS) • IP Security
• HTTPS • IP security (Overview & Policy)
• Secure Shell (SSH) • Encapsulating Security Payload
• Wireless Network Security • Combing Security
• IEEE 802.11 Wireless LAN security • Internet Key Exchange
• Wireless Application Protocol Overview
• Wireless Transport Layer Security
• Wireless Physical Layer Security
PROJECTS

• Book: • References
• Hacking Project • Research Papers
• Block Cipher Projects • Algorithms
• Research Projects • ML in Cyber-Security
• Programming Porjects
GRADING

• Formal Grading • Actual Grading


• Quizzes: 25 % • Projects: 25 %
• Assignments : 5% • Quizzes: 10%
• Midterm-exam: 25% • Assignments: 5%
• Final Exam: 45% • Mid-term Exam: 20%
• Final Exam: 40%

Das könnte Ihnen auch gefallen