Sei sulla pagina 1di 3

Department of Computer Science and Engineering

NITK, Surathkal
CO313 – Number Theory and Cryptography
(Syllabus and Assessment Plan)

Semester: V Academic Year: 2018-19 Credits: (3-0-0) 3

A. Syllabus
(Total No. of Theory Hrs. – 32)

Sl. No. Topic Details No. of Hrs.


 Divisibility
 Greatest common divisors
 Euclidean Algorithm
 Factorization of integers
 Congruence
1 Basic Concepts in Number Theory 8
 Modular arithmetic
 Quadratic residues
 Quadratic reciprocity
 Finite fields
 Time estimates for doing arithmetic
 Symmetric Cipher Model
2 Classical Encryption Techniques  Substitution Techniques 3
 Transposition Techniques
 Traditional Block Cipher Structures
 The Data Encryption Standard
3 Block Ciphers 4
 Advanced Encryption Standard
 Block Cipher Operation
 Stream ciphers
4 Stream Ciphers 2
 RC4
Page 1 of 3
 Principles of Pseudo random number generation.
5 Pseudo Random Number Generators  Pseudo random number generators. 2
 Randomness and Pseudo randomness.
 Principles of Public-Key Cryptosystems.
 The RSA Algorithm.
6 Public Key Cryptography  Diffie-Hellman Key Exchange. 4
 Elliptic curve cryptosystem.
 Probabilistic encryption.
 Applications of Cryptographic hash Functions.
 Hash Functions.
7 Cryptographic Hash Function  Message Authentication Codes. 5
 Message Digest.
 Digital Signatures
 Remote user-authentication principles.
8 User Authentication 2
 Remote user-authentication using symmetric encryption.
9 Zero-knowledge protocol  Overview of zero-knowledge concepts 1
 Formal verification of cryptographic protocols: Survey.
(Research paper by C.A. Meadows)
10 Formal Verification 1
 Analyzing encryption protocols using formal verification
techniques. (Research paper by R.A. Kemmerer)

Text Books:
 Neal Koblitz, “Course on Number Theory and Cryptography”, Springer-Verlag, 1986.
 Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, “Handbook of Applied Cryptography”, CRC Press, 1996.
 Ivan Niven, Herbert S. Zukerman, Hugh L. Montgomery, “An Introduction to the Theory of Numbers”, John Wiley, 5th Edition. 2015.
 William Stallings, “Cryptography and Network Security”, Pearson, 6th Edition, 2015.

Page 2 of 3
B. Assessment Plan
1. End-Sem Examination: 45%
2. Mid-Sem Examination: 20%
3. Quiz: 10%
4. Assignments: 25%

Course Instructor Secretary Chairman


(B. R. Chandavarkar) (DUGC) (DUGC)

Page 3 of 3

Potrebbero piacerti anche