Syllabus
Electives in Cyber Security
Unit I
Classical ciphers and cipher strength
Basics of number theory, Encryption and Decryption of monoalphabetic and polyalphabetic ciphers. Cryptanalysis. Perfect Secrecy-Information and Entropy – Source Coding, Channel Coding, and Cryptography – Product cryptosystems.
Unit II
Symmetric Key Cryptography
Foundations of Modern Cryptography: Symmetric Cryptosystems: Substitution Permutation Networks – DES and Enhancements – AES and its Modes, Blowfish.
Unit III
Asymmetric Key Cryptography
Foundations of Asymmetric Key Cryptography – RSA Cryptosystem – Attacks on RSA Discrete Logarithm Problem and related algorithms – El-Gamal Cryptosystem – Elliptic curve cryptography
Objectives and Outcomes
Course Objectives
- The course will cover how cryptography (symmetric and asymmetric) works, how security is analyzed theoretically, and how exploits work in practice.
- It will also present Cryptanalysis attacks against the cryptographic techniques, and attack models.
Course Outcomes
CO1: Understand classical cryptography techniques and apply cryptanalysis.
CO2: Analyze measures for securing cryptosystem.
CO3: Apply and analyze operations on Feistel and non-Feistel structures.
CO4: Apply asymmetric encryption techniques for securing messages.
CO-PO Mapping
PO/PSO |
PO1 |
PO2 |
PO3 |
PO4 |
PO5 |
PO6 |
PO7 |
PO8 |
PO9 |
PO10 |
PO11 |
PO12 |
PSO1 |
PSO2 |
CO |
CO1 |
3 |
3 |
2 |
2 |
|
|
|
|
|
|
|
2 |
2 |
1 |
CO2 |
3 |
3 |
2 |
2 |
|
|
|
|
|
|
|
2 |
2 |
2 |
CO 3 |
3 |
3 |
3 |
3 |
|
|
|
|
|
|
|
2 |
2 |
2 |
CO4 |
3 |
3 |
2 |
3 |
|
|
|
|
|
|
|
2 |
3 |
2 |
Evaluation Pattern
Evaluation Pattern: 70:30
Assessment |
Internal |
End Semester |
Midterm |
20 |
|
*Continuous Assessment Theory (CAT) |
10 |
|
*Continuous Assessment Lab (CAL) |
40 |
|
**End Semester |
|
30 (50 Marks; 2 hours exam) |
* CAT – Can be Quizzes, Assignment, and Reports
* CAL – Can be Lab Assessments, Projects, and Reports
**End Semester can be theory examination/ lab-based examination/ project presentation
Text Books / References
Textbook(s)
Stallings W. “Cryptography and network security: principles and practice”. Upper Saddle River: Pearson; 2018. Padmanabhan TR, Shyamala C K, and Harini N. “Cryptography and Security”, First Edition, Wiley India Publications; 2011.
Reference(s)
Forouzan BA. “Cryptography & network security”. McGraw-Hill, Inc.; 2007 Feb 28.