Back close

Course Detail

Course Name Cryptography
Course Code 24CY603
Program M. Tech. in Cyber Security
Semester 1
Credits 4
Campus Coimbatore

Objectives and Outcomes

Prerequisites

Elementary Number Theory, Arithmetic functions, Congruence, Algebraic Structures – Groups, Rings, Fields

Stream ciphers: Pseudo-random generators, Attacks on the one time pad, Linear generators, Cryptanalysis of linear congruential generators, Block ciphers: Pseudorandom functions and permutations (PRFs and PRPs), PRP under chosen plaintext attack and chosen ciphertext attack, Case study: DES, AES, modes of operation . Message integrity: Cryptographic hash functions, message authentication code, CBC MAC and its security, Cryptographic hash functions based MACs. Authenticated Encryption-Authenticated encryption ciphers from generic composition, Public key encryption: RSA, Diffie-Hellman key exchange protocol, ElGamal encryption, Elliptic curve cryptography. Digital signatures: Generic signature schemes, RSA, ElGamal and Rabin’s signature schemes, blind signatures, threshold signature schemes, ECDSA, Signcryption, Homomorphic encryption, Order preserving encryption, searchable encryption.

 

Course Outcome
Course Outcome Bloom’s Taxonomy Level
CO1 Comprehend fundamental cryptographic primitives and their applications. L1,L2
CO2 Understand the strengths and weaknesses of different ciphers, hash functions, and message authentication methods. L2,L3,L4
CO3 Understand public key cryptosystem and key management. L1,L3,L5
CO4 Understand digital signatures, homomorphic encryption, order-preserving, and searching encryption. L2, L5,L6 

 

CO-PO Mapping

CO-PO Mapping 

CO/PO 

PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PSO1 PSO2 PSO3
CO 1 1 2 2 1 2 1 1 2 1 1 1
CO 2 1 2 2 1 2 1 1 2 2 2 2
CO 3 1 2 2 1 2 1 1 2 2 2 2
CO 4 1 2 2 1 2 1 1 2 2 2 2

Text Books / References

  1. A. J. Menezes, P. C. V. Oorschot and S. A. Vanstone, Handbook of Applied Cryptography , CRC Press, 1996.
  2. O. Goldreich, Foundations of Cryptography: Vol. 1, Basic Tools , Cambridge University Press, 2001.
  3. O. Goldreich, Foundations of Cryptography: Vol. 2, Basic Applications, Cambridge University Press, 2004.
  4. J. Katz and Y. Lindell, Introduction to Modern Cryptography , Chapman & Hall/CRC, 2007.
  5. Abhijit Das and Veni Madhavan C. E., Public-Key Cryptography: Theory and Practice , Pearson Education India, 2009.
  6. Abijit Das, Computational Number theory , CRC Press, 2013.
  7. Dan Boneh and Victor Shoup, A Graduate Course in Applied Cryptography , V 0.5, 2020

DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.

Admissions Apply Now