This course introduces the principles and design of cryptosystems, covering traditional ciphers, block ciphers, stream ciphers, public and private key cryptosystems, hash functions, authentication systems, network security protocols, and malicious logic.
Familiarize students with cryptography and its applicationsDevelop basic understanding of cryptographic mechanisms
Security: Computer Security, Information Security, Network Security, CIA Triad, Cryptography, Cryptosystem, Cryptanalysis, Security Threats and Attacks, Security Services, Security Mechanisms, Classical Cryptosystems: Substitution Techniques (Caesar, Monoalphabetic, Playfair, Hill, Polyalphabetic ciphers, One-time pad), Transposition Techniques (Rail Fence Cipher), Modern Ciphers: Block vs. Stream Ciphers, Symmetric vs. Asymmetric Ciphers
Feistel Cipher Structure, Substitution Permutation Network (SPN), Data Encryption Standards (DES), Double DES, Triple DES, Finite Fields: Groups, Rings, Fields, Modular Arithmetic, Euclidean Algorithm, Galois Fields (GF(p) & GF(2^n)), Polynomial Arithmetic, International Data Encryption Standard (IDEA), Advanced Encryption Standards (AES) Cipher, Modes of Block Cipher Encryptions: ECB, CBC, CFB, OFB, Counter Mode
Number Theory: Prime Numbers, Fermat’s Theorem, Euler’s Theorem, Primality Testing, Miller-Rabin Algorithm, Extended Euclidean Theorem, Discrete Logarithms, Public Key Cryptosystems and Applications, Key Distribution: Diffie-Hellman Key Exchange, Man-in-the-Middle Attack, RSA Algorithm, ElGamal Cryptographic System
Message Authentication, Message Authentication Functions, Message Authentication Codes, Hash Functions: Properties and Applications, Message Digests: MD4 and MD5, Secure Hash Algorithms: SHA-1 and SHA-2, Digital Signatures: Direct and Arbitrated Digital Signatures, Digital Signature Standard: DSS Approach, Digital Signature Algorithm, RSA Approach
Authentication Systems, Password-Based Authentication, Dictionary Attacks, Challenge Response Systems, Biometric Systems, Needham-Schroeder Scheme, Kerberos Protocol
Overview of Network Security, Digital Certificates and X.509 certificates, Certificate Life Cycle Management, PKI Trust Models, PKIX, Email Security: Pretty Good Privacy (PGP), Secure Socket Layer (SSL) and Transport Layer Security (TLS), IP Security (IPSec), Firewalls and Types
Implement and simulate cryptographic algorithms, hash functions, digital signatures, network security protocols and malicious logicStudents may use any programming language and platform based on their skills