CSE2221 - Cryptography Handout Updated_Feb 20
CSE2221 - Cryptography Handout Updated_Feb 20
Target Target
C
CO Statement Level Attainm Attainm
O
ent % ent level
2
Illustrate the fundamentals of 1 (Understan ≥ 80 3
cryptography
d)
Solve problems on 3 ≥ 70% <
mathematical concepts used in 2 2
(Apply) 80%
cryptographic techniques
Make use of symmetric
encryption algorithms such as 3 ≥ 70% <
DES and AES, along with their 3 2
(Apply) 80%
modes of operation, in a
defined context.
Utilize public-key techniques
such as RSA, Diffie-Hellman, 3
and Elliptic Curve 4 ≥ 80 3
(Apply)
Cryptography for secure key
exchange and encryption
Demonstrate secure 2
communication and 5 (Understan ≥ 80 3
authentication techniques d)
E. Assessment Plan:
F. Syllabus:
Introduction: Basic objectives of cryptography, Secret-key and public-
key cryptography, One-way trapdoor one-way functions, Cryptanalysis,
Attack models, Classical cryptography; Block ciphers: Modes of
operation, Public-key parameters: Modular arithmetic, GCD, primality
testing, Chinese remainder theorem, modular square roots, finite fields;
DES and its variants, AES, Linear and differential cryptanalysis;
Message digest: Properties of hash functions, MD2, MD5 and SHA-1,
Keyed hash functions, Attacks on hash functions. Pseudorandom
Number Generation; Intractable problems: Integer factorization
problem, RSA problem, Modular square root problem, Discrete
logarithm problem, Diffie-Hellman problem, known algorithms for
solving the intractable problems; Public-key encryption: RSA,
EIGamal scheme, Elliptic and hyperelliptic, curve cryptography, Side
channel attacks, Diffie-Hellman and MQV key exchange; Digital
signatures: RSA, DSA and NR signature schemes, blind and
undeniable signatures; Entity authentication: Passwords, Challenge
response algorithms, Zero-knowledge protocols; Transport-Level
Security: Web Security Issues, Secure Sockets Layer (SSL), Transport
Layer Security (TLS), Electronic Mail Security, Pretty Good Privacy
(PGP); IP Security: IP Security Overview, IP Security Policy,
Encapsulating Security, Payload, Combining Security Associations,
Internet Key Exchange.
Textbooks
1. B. A. Forouzan, D. Mukhopadhyay, “Cryptography and Network
Security”, McGraw Hill, 3rd Edition, 2008.
2. W. Stallings, “Cryptography and Network Security: Principles and
Practice”, Prentice Hall, 5th edition, 2010.
G. Lecture Plan:
Mode Mode of
Lect. of
Topics Session Outcome CO Assessin
No. deliver g CO
y
Introduction to
Security Goals, Describe the
1. objectives of MTE,
1 Attacks, Services 1
and Mechanisms cryptography and Lecture CWS, ETE
its types.
Apply linear 2
4. MTE,
Linear Congruence congruence and its Lecture
4 CWS, ETE
applications
Demonstrate the
7. working of MTE,
1 Lecture
7 Transposition Ciphers transposition CWS, ETE
ciphers
Learnin
Solve problems on
g
Substitution and MTE,
8. Tutorial Session 1 through
transposition CWS, ETE
problem
ciphers
-solving
Lecture/
18. Understanding MTE,
Flipped
2 Variants of DES variants of DES
3
CWS, ETE
Classro
om
Block Cipher Modes Demonstration of Technol MTE,
of Operation modes of operation ogy CWS, ETE
19. 3
based
learning
20. AES Structure, AES Knowledge of AES Lecture MTE,
2 Round Functions 3
cipher CWS, ETE
Understanding key
21. MTE,
2 AES Key Expansion expansion of AES 3 Lecture CWS, ETE
algorithm
Technol
22. Security issues of Illustrating attacks MTE,
3 ogy
2 DES and AES on DES and AES CWS, ETE
based
learning
Learning
Solve Simplified through MTE,
23. Tutorial Session 3
AES problem- CWS, ETE
solving
24. Number Theory Utilize number 2 Lecture
MTE,
theory and its
CWS, ETE
applications
Solve problems on
25. Euler’s Theorem and Euler’s theorem
2 Fermat’s Little 2 Lecture CWS, ETE
and Fermat’s Little
Theorem theorem
Technol
37. Side Channel Illustrate Side
5 ogy CWS, ETE
3 Attacks Channel Attacks based
learning
Lecture/
38. Illustrate Digital
5 Flipped CWS, ETE
4 DSA and NR Signature schemes
signature schemes Classro
om
Explain the
45. Electronic Mail concept of Peer
4 Security 5 teachin CWS, ETE
Electronic Mail
Security g
Solve problems on
2 mathematical concepts used in 3 2 2 1
cryptographic techniques
Make use of symmetric
encryption algorithms such as
3 DES and AES, along with their 3 3 2 1 3 2 1 1 1 3
modes of operation, in a
defined context.
Utilize public-key techniques
such as RSA, Diffie-Hellman,
4 and Elliptic Curve Cryptography 3 3 2 1 3 2 1 1 1 3
for secure key exchange and
encryption
Demonstrate secure
5 communication and 1 3 2 1 3 3 2 2 2 1 1 3
authentication techniques
1: Low Correlation 2: Moderate Correlation 3: Substantial Correlation