Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Course Description:
Classical systems, information theory, mathematical background material, symmetrical
crypto systems, block ciphers, stream ciphers, DES, Advanced Encryption Algorithm (AES),
hash functions and message authentication (MAC), asymmetric cryptosystems, RSA, digital
signatures, elliptic curves.
T1. D. R. Stinson, Cryptography: Theory and Practice, 3rd ed. Boca Raton, FL: Chapman &
Hall/CRC, 2005. (ISBN No.: 978-1-58-488508-5)
T2. W. Stallings, Cryptography and Network Security: Principles and Practice, 5th Ed.
Boston: Prentice Hall, 2010. (ISBN No.: 978-0-13-609704-4)
T3. J. H. Silverman, A Friendly Introduction to Number Theory, 4th Ed. Boston: Pearson,
2012.
T4. C. Kaufman, R. Perlman, and M. Speciner, Network Security: Private Communication in
a Public .
Reference Books:
R1 Atul Kahate, Cryptography and Network Security, 2nd ed., Tata Mcgraw Hill education
Private Limited, 2011.
R2 Computer Security, Dieter Gollman,3rd ed, Wiley Publications,2011.
R3 Introduction to Computer Security, Matt Bishop,1st ed,Addison-Wesley
Proffesional,2004..
R4. Hand Book of Applied Cryptography, by Alfred Menezes, Paul van Oorschot, Scott
Vanstone , CRC.
Fall 2015-2016
BSCSE2330 (Introduction to Cyptographic Fundamentals)
Reference
Lecture Learning Course Total
Date Topics to be covered Chap./Sec.
No. Objectives Module Lectures
(Book)
17th july,18
1
Introduction to course
18th July, 18 Information Security -
2 Confidentiality, Integrity &
Availability
19th july Authentication,
3 Authorization & Non-
Repudiation
24th july,18 Students gets Services and mechanism
4 the knowledge
Module - Chapter 1 ,2
25th july, 18 on 9
Fundamentals of
Introduction to Plain Text, 1 of T1
5
Cryptogaphy Cipher Text,
26th july, 18 Encryption and Decryption
6
Techniques, Secure Key,
7 31st july 18
Hashing, Digital signature
01st aug, 18
8 Mathematics of
Cryptography
02nd aug, 18
9
Modulo arithmetic
7th aug, 18 Symmetric and Asymmetric
10
Encryption
8th aug, 18
11
Block cipher, Stream Cipher
9th aug, 18 Data Encryption Standard
12 Students (DES) - Cipher Block
understands
Chaining (CBC) Module- Chapter 3 of
13
th encryption and 2 T1
14 aug, 18 Multiple Encryption DES -
decryption
International Data
13
Encryption Algorithm
(IDEA)
16th aug, 18 Advanced Encryption
14 Standard (AES).
21st aug,18 Asymmetric key generation
15
techniques
22nd aug,18
16 Applications of Asymmetric
encryption methods –
17 23rd aug, 18
TEST-1
29th aug, 18
18 RSA- Elliptic Curve
Cryptography
30th aug, 18
19
Quiz-1
04th sept, 18
20 Problem discussion on
techniques
05th sept, 18
21 Problem on mathematics of
cryptography
06th sept, 18
22
Revision
24 19th Sep,
18 Students Digital signature standards
25 20th Sep, 18 understands the
various Secure One-time Signatures Module- Chapter
25th Sep, 18 7
26 propogation 3 4,5of T1
models and
CAT-1 answer distribution
26nd Sep, fading concepts Algorithm to generate
27 18 secure on time signature
27th Sep, 18 Diffie-Hellman Key
28
Exchange
3rd oct, 18 Elliptic Curve Digital
29
Signature
Cryptographic Hash
32
10th Oct,18 Functions
Applications- Simple hash
33 11th Oct, functions and features for
18 ensuring security Module- Chapter 6 of
Students gets 5
4 T1
the knowledge
on analog and
digital
35 modulation Hash functions based on
17th Oct, 18 techniques, Cipher Block Chaining
36
36
Evaluation Scheme:
Teaching Pedagogy: Black Board, Power Point Presentations, Videos, Internet Resources,
MHRD Pedagogy Online Course Material (Student Centric Learning),
Chamber Consultation Hour: Sunday 11:00am to 11:50am
Thursday 11:00AM-11:50AM
Notices: All notices concerning this course will be displayed on the School Notice Board of
SECE and will also be available in the google site link
“https://sites.google.com/a/galgotiasuniversity.edu.in/wmc/ ”.