0% found this document useful (0 votes)
2 views

MINOR401C

The course MINOR401C, titled 'Information Theory for Cyber Security', offers 4 credits and covers information coding techniques and error correction mechanisms essential for cyber security. Students will learn principles of information theory, encryption algorithms, secrecy metrics, and cryptographic methods including Elliptic Curve Cryptography. The course includes various modules focusing on topics such as Shannon's information theory, symmetric ciphers, quantum cryptography, and digital forensics.

Uploaded by

kumawatharsh191
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

MINOR401C

The course MINOR401C, titled 'Information Theory for Cyber Security', offers 4 credits and covers information coding techniques and error correction mechanisms essential for cyber security. Students will learn principles of information theory, encryption algorithms, secrecy metrics, and cryptographic methods including Elliptic Curve Cryptography. The course includes various modules focusing on topics such as Shannon's information theory, symmetric ciphers, quantum cryptography, and digital forensics.

Uploaded by

kumawatharsh191
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Course Code : MINOR401C

Course Title : Information Theory for Cyber Security


Number of Credits : 4 (L: 3; T: 0; P: 2)
Course Category : CBS
Pre-requisites : Probability Theory, Computer Networks

Course Objective: : The objective of this course is to provide an


insight to information coding techniques, error
correction mechanism for cyber security.

10
Course Outcomes:
After completion of course, students would be able:

CO1 To introduce the principles and applications of information theory.

To analyze and implement different encryption algorithms for ensuring secure


CO2
communication.
To analyze and apply Secrecy Metrics such as strong, weak, semantic security,
CO3
and partial secrecy to evaluate the effectiveness of cryptographic systems.
To learn cryptographic methods used in forensics and applying Elliptic Curve
CO4 Cryptography (ECC) in secure communication systems to evaluate its efficiency
in lightweight cryptographic applications. 11
Course Contents:

Lecture
Hour
Module/ Topic Sub- Topic

Shannon’s foundation of Information theory, Random variables,


Probability distribution factors, Uncertainty/entropy
information measures, Leakage, Quantifying Leakage and
1 8
Partitions, Lower bounds on key size: secrecy, authentication
and secret sharing.
Provable security, computationally-secure, symmetric cipher.

12
Lecture
Hour
Module/ Topic Sub- Topic

Secrecy, Authentication, Secret sharing, Optimistic results


on perfect secrecy, Secret key agreement, Unconditional
Security, Quantum Cryptography, Randomized Ciphers,
Module 2 8
Types of codes: block codes, Hamming and Lee metrics,
description of linear block codes, parity check Codes, cyclic
code, Masking techniques.
13
Lecture
Hour
Module/ Topic Sub- Topic

Information-theoretic security and cryptograph, basic


Module 3 introduction to Diffie-Hellman, AES, and side-channel 8
attacks.
Secrecy metrics: strong, weak, semantic security, partial
secrecy, Secure source coding: rate-distortion theory for
Module 4 10
secrecy systems, side information at receivers, Differential
privacy, Distributed channel synthesis.
14
Lecture
Hour
Module/ Topic Sub- Topic

Digital and network forensics, Public Key Infrastructure,


Module 5 Light weight cryptography, Elliptic Curve Cryptography and 8
applications.

15
Text Books/References:
1. Information Theory and Coding, Muralidhar Kulkarni, K S Shivaprakasha, John Wiley & Sons.
2. Communication Systems: Analog and digital, Singh and Sapre, Tata McGraw Hill.
3. Fundamentals in information theory and coding, Monica Borda, Springer.
4. Information Theory, Coding and Cryptography R Bose.
5. Multi-media System Design, Prabhat K Andleigh and Kiran Thakrar.

Online resource :
1. https://nptel.ac.in/courses/117101053
2. https://www.coursera.org/learn/information-theory

Online Lab:
1. Welcome to Virtual Labs

16

You might also like