Unit 1
Number theory concepts – Divisibility,GCD,modular exponential,congruence,Chinese remainder theorem.Groups,rings,fields.
Course Name | Applied Cryptography |
Course Code | 23AID451 |
Credits | 3 |
Campus | Coimbatore , Amritapuri ,Faridabad , Bangaluru, Amaravati |
Number theory concepts – Divisibility,GCD,modular exponential,congruence,Chinese remainder theorem.Groups,rings,fields.
Overview of Cryptography , Symmetric key cryptography, stream ciphers, block ciphers, DES and Enhancements, AES, Attacks on block ciphers, Message integrity- Message integrity: definition and applications. Hashing, collision resistance. Public key cryptography- Arithmetic modulo primes, Cryptography using arithmetic modulo primes, Public key encryption Arithmetic modulo composites,.RSA,Attacks on RSA, Rabin Cryptosystem, Discrete Logarithm Problem and related Algorithms, ElGamal Cryptosystem
Introduction to Elliptic Curve Cryptography, Digital signatures: definitions and applications, More signature schemes and applications, Identification protocols, Authenticated key exchange and SSL/TLS session setup, Zero knowledge protocols. Key agreement protocols, Diffie-Hellman protocol, variations.
Course Objectives
Course Outcomes
After completing this course, students will be able to
CO1 |
Analyze the concepts of classical and modern cryptography. |
CO2 |
Analyze the common attacks and the preventive systems. |
CO3 |
Apply appropriate cryptographic techniques to a security engineering problem |
CO4 |
Implement standard security protocols. |
CO-PO Mapping
PO/PSO |
PO1 |
PO2 |
PO3 |
PO4 |
PO5 |
PO6 |
PO7 |
PO8 |
PO9 |
PO10 |
PO11 |
PO12 |
PSO1 |
PSO2 |
PSO3 |
CO |
|||||||||||||||
CO1 |
3 |
3 |
2 |
2 |
– |
– |
– |
– |
2 |
2 |
– |
3 |
2 |
2 |
1 |
CO2 |
3 |
3 |
3 |
3 |
– |
– |
– |
– |
2 |
2 |
– |
3 |
1 |
2 |
1 |
CO3 |
3 |
2 |
3 |
3 |
1 |
– |
– |
– |
2 |
2 |
– |
3 |
2 |
2 |
1 |
CO4 |
3 |
2 |
3 |
3 |
– |
– |
– |
– |
2 |
2 |
– |
3 |
1 |
2 |
1 |
Evaluation Pattern
Assessment |
Internal/External |
Weightage (%) |
Assignments (minimum 2) |
Internal |
30 |
Quizzes (minimum 2) |
Internal |
20 |
Mid-Term Examination |
Internal |
20 |
Term Project/ End Semester Examination |
External |
30 |
Text Books / References
James Strayer, Elementary Number Theory, Waveland Press, 2002.
Katz, Jonathan, and Yehuda Lindell. Introduction to modern cryptography. Chapman and Hall/CRC, 2014
Katz, Jonathan, Alfred J. Menezes, Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of applied ryptography. CRC press, 1996.
Stallings, William. Cryptography and network security: principles and practice. Upper Saddle River:Pearson, 2017.
DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.