Sei sulla pagina 1di 5

Galgotias University, Greater Noida

Fall Semester 2018-2019


Course Handout
Date: 15/08/2018

This document gives specific details regarding the course.

Course No. : BSCSE2330


Course Title : Introduction to Cryptographic Fundamentals
Instructor-in-Charge : Kanika Singla

Course Description:
Classical systems, information theory, mathematical background material, symmetrical
crypto systems, block ciphers, stream ciphers, DES, Advanced Encryption Algorithm (AES),
hash functions and message authentication (MAC), asymmetric cryptosystems, RSA, digital
signatures, elliptic curves.

Scope & Objective:


The purpose of this course is to provide basic concepts cryptographic techniques. This also
covers digital signatures and applications.
Objectives:
1. To learn the fundamental concepts of cryptography.
2. To defend the security attacks on information systems with secure algorithms.
Text Books:

T1. D. R. Stinson, Cryptography: Theory and Practice, 3rd ed. Boca Raton, FL: Chapman &
Hall/CRC, 2005. (ISBN No.: 978-1-58-488508-5)
T2. W. Stallings, Cryptography and Network Security: Principles and Practice, 5th Ed.
Boston: Prentice Hall, 2010. (ISBN No.: 978-0-13-609704-4)
T3. J. H. Silverman, A Friendly Introduction to Number Theory, 4th Ed. Boston: Pearson,
2012.
T4. C. Kaufman, R. Perlman, and M. Speciner, Network Security: Private Communication in
a Public .

Reference Books:

R1 Atul Kahate, Cryptography and Network Security, 2nd ed., Tata Mcgraw Hill education
Private Limited, 2011.
R2 Computer Security, Dieter Gollman,3rd ed, Wiley Publications,2011.
R3 Introduction to Computer Security, Matt Bishop,1st ed,Addison-Wesley
Proffesional,2004..
R4. Hand Book of Applied Cryptography, by Alfred Menezes, Paul van Oorschot, Scott
Vanstone , CRC.
Fall 2015-2016
BSCSE2330 (Introduction to Cyptographic Fundamentals)

B.TECH CSE third


SEMESTER
Faculty Name: Ms.Kanika Singla

Reference
Lecture Learning Course Total
Date Topics to be covered Chap./Sec.
No. Objectives Module Lectures
(Book)

17th july,18
1
Introduction to course
18th July, 18 Information Security -
2 Confidentiality, Integrity &
Availability
19th july Authentication,
3 Authorization & Non-
Repudiation
24th july,18 Students gets Services and mechanism
4 the knowledge
Module - Chapter 1 ,2
25th july, 18 on 9
Fundamentals of
Introduction to Plain Text, 1 of T1
5
Cryptogaphy Cipher Text,
26th july, 18 Encryption and Decryption
6
Techniques, Secure Key,
7 31st july 18
Hashing, Digital signature
01st aug, 18
8 Mathematics of
Cryptography
02nd aug, 18
9
Modulo arithmetic
7th aug, 18 Symmetric and Asymmetric
10
Encryption
8th aug, 18
11
Block cipher, Stream Cipher
9th aug, 18 Data Encryption Standard
12 Students (DES) - Cipher Block
understands
Chaining (CBC) Module- Chapter 3 of
13
th encryption and 2 T1
14 aug, 18 Multiple Encryption DES -
decryption
International Data
13
Encryption Algorithm
(IDEA)
16th aug, 18 Advanced Encryption
14 Standard (AES).
21st aug,18 Asymmetric key generation
15
techniques
22nd aug,18
16 Applications of Asymmetric
encryption methods –
17 23rd aug, 18
TEST-1
29th aug, 18
18 RSA- Elliptic Curve
Cryptography
30th aug, 18
19
Quiz-1
04th sept, 18
20 Problem discussion on
techniques
05th sept, 18
21 Problem on mathematics of
cryptography
06th sept, 18
22
Revision

CAT-1 10-14th Sept 2018.


18th Sep, 18
23 Cat-1 question paper
discussion

24 19th Sep,
18 Students Digital signature standards
25 20th Sep, 18 understands the
various Secure One-time Signatures Module- Chapter
25th Sep, 18 7
26 propogation 3 4,5of T1
models and
CAT-1 answer distribution
26nd Sep, fading concepts Algorithm to generate
27 18 secure on time signature
27th Sep, 18 Diffie-Hellman Key
28
Exchange
3rd oct, 18 Elliptic Curve Digital
29
Signature
Cryptographic Hash
32
10th Oct,18 Functions
Applications- Simple hash
33 11th Oct, functions and features for
18 ensuring security Module- Chapter 6 of
Students gets 5
4 T1
the knowledge
on analog and
digital
35 modulation Hash functions based on
17th Oct, 18 techniques, Cipher Block Chaining
36

18th Oct,18 SHA

36

23rd oct, 18 Message Digest - MD5


CAT-2 12th - 16th October 2015

37 24th oct, Applying cryptography


18 algorithms
25th oct, Smart cards-Mobile phone
38
18 security
39 30th Oct,18 Test -2/quiz-2
31st Electronic passports and ID
40 Students gets
Nov,15 cards
in depth
01st Nov, knowledge on Module- Chapter 9
41 10
18 GSM and SDA/DDA/CDA Bank Cards 5 ,11 of T1
06th Nov, CDMA Financial Cryptography –
42
18 systems. Secure Payment Systems -
07th Nov,
43
18 Crypto currencies – Bitcoin.
08th
44
Nov,18 Case study-Bitcoin
45 13th Nov,18 Application in IT sector
14th Nov,
46
18 revision

Evaluation Scheme:

EC Evaluation Duration Marks Date &Time Nature of


No. Component (50) Component
1. CAT-1 90 mins 50 (15) 10th -14th sept,2018 Closed Book
th th
2. CAT-2 90 mins 50 (15) 12 -17 October 2018 Closed Book
th
3. Test-1 15 mins 5 20-24 Aug 2018 Closed Book
4. Quiz-1 15 mins 5 01-7th sept 2018 Closed Book
th
5. Test-2 15mins 5 30 oct,2018 Closed Book
4. Assignment(s) - 5 Any time throughout the Open Book
semester

Teaching Pedagogy: Black Board, Power Point Presentations, Videos, Internet Resources,
MHRD Pedagogy Online Course Material (Student Centric Learning),
Chamber Consultation Hour: Sunday 11:00am to 11:50am
Thursday 11:00AM-11:50AM
Notices: All notices concerning this course will be displayed on the School Notice Board of
SECE and will also be available in the google site link
“https://sites.google.com/a/galgotiasuniversity.edu.in/wmc/ ”.

Instructor-in-charge : Kanika Singla

Potrebbero piacerti anche