Back close

Course Detail

Course Name Applied Cryptography
Course Code 23AID451
Credits 3
Campus Coimbatore , Amritapuri ,Faridabad , Bangaluru, Amaravati

Syllabus

Unit 1

Number theory concepts – Divisibility,GCD,modular exponential,congruence,Chinese remainder theorem.Groups,rings,fields.

Unit 2

Overview of Cryptography , Symmetric key cryptography, stream ciphers, block ciphers, DES and Enhancements, AES, Attacks on block ciphers, Message integrity- Message integrity: definition and applications. Hashing, collision resistance. Public key cryptography- Arithmetic modulo primes, Cryptography using arithmetic modulo primes, Public key encryption Arithmetic modulo composites,.RSA,Attacks on RSA, Rabin Cryptosystem, Discrete Logarithm Problem and related Algorithms, ElGamal Cryptosystem

Unit 3

Introduction to Elliptic Curve Cryptography, Digital signatures: definitions and applications, More signature schemes and applications, Identification protocols, Authenticated key exchange and SSL/TLS session setup, Zero knowledge protocols. Key agreement protocols, Diffie-Hellman protocol, variations.

Objectives and Outcomes

Course Objectives

  • To understand the underlying fundamentals of classical and modern cryptography
  • To understand about the cryptographic systems used over the Internet.
  • To help the students to study cryptographic protocols, common attacks and their prevention.

 

Course Outcomes

After completing this course, students will be able to

CO1

Analyze the concepts of classical and modern cryptography.

CO2

Analyze the common attacks and the preventive systems.

CO3

Apply appropriate cryptographic techniques to a security engineering problem

CO4

Implement standard security protocols.

CO-PO Mapping

PO/PSO

PO1

PO2

PO3

PO4

PO5

PO6

PO7

PO8

PO9

PO10

PO11

PO12

PSO1

PSO2

PSO3

CO

CO1

3

3

2

2

2

2

3

2

2

1

CO2

3

3

3

3

2

2

3

1

2

1

CO3

3

2

3

3

1

2

2

3

2

2

1

CO4

3

2

3

3

2

2

3

1

2

1

Evaluation Pattern

Evaluation Pattern

Assessment

Internal/External

Weightage (%)

Assignments (minimum 2)

Internal

30

Quizzes (minimum 2)

Internal

20

Mid-Term Examination

Internal

20

Term Project/ End Semester Examination

External

30

Text Books / References

Text Books / References

James Strayer, Elementary Number Theory, Waveland Press, 2002.

Katz, Jonathan, and Yehuda Lindell. Introduction to modern cryptography. Chapman and Hall/CRC, 2014

Katz, Jonathan, Alfred J. Menezes, Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of applied ryptography. CRC press, 1996.

Stallings, William. Cryptography and network security: principles and practice. Upper Saddle River:Pearson, 2017.

DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.

Admissions Apply Now