Electives in Cyber Security
Course Name | Cryptography |
Course Code | 23CSE331 |
Program | B. Tech. in Computer Science and Engineering (CSE) |
Credits | 3 |
Campus | Amritapuri ,Coimbatore,Bengaluru, Amaravati, Chennai |
Electives in Cyber Security
Classical ciphers and cipher strength
Basics of number theory, Encryption and Decryption of monoalphabetic and polyalphabetic ciphers. Cryptanalysis. Perfect Secrecy-Information and Entropy – Source Coding, Channel Coding, and Cryptography – Product cryptosystems.
Symmetric Key Cryptography
Foundations of Modern Cryptography: Symmetric Cryptosystems: Substitution Permutation Networks – DES and Enhancements – AES and its Modes, Blowfish.
Asymmetric Key Cryptography
Foundations of Asymmetric Key Cryptography – RSA Cryptosystem – Attacks on RSA Discrete Logarithm Problem and related algorithms – El-Gamal Cryptosystem – Elliptic curve cryptography
Course Objectives
Course Outcomes
CO1: Understand classical cryptography techniques and apply cryptanalysis.
CO2: Analyze measures for securing cryptosystem.
CO3: Apply and analyze operations on Feistel and non-Feistel structures.
CO4: Apply asymmetric encryption techniques for securing messages.
CO-PO Mapping
PO/PSO | PO1 | PO2 | PO3 | PO4 | PO5 | PO6 | PO7 | PO8 | PO9 | PO10 | PO11 | PO12 | PSO1 | PSO2 |
CO | ||||||||||||||
CO1 | 3 | 3 | 2 | 2 | 2 | 2 | 1 | |||||||
CO2 | 3 | 3 | 2 | 2 | 2 | 2 | 2 | |||||||
CO 3 | 3 | 3 | 3 | 3 | 2 | 2 | 2 | |||||||
CO4 | 3 | 3 | 2 | 3 | 2 | 3 | 2 |
Evaluation Pattern: 70:30
Assessment | Internal | End Semester |
Midterm | 20 | |
*Continuous Assessment Theory (CAT) | 10 | |
*Continuous Assessment Lab (CAL) | 40 | |
**End Semester | 30 (50 Marks; 2 hours exam) |
* CAT – Can be Quizzes, Assignment, and Reports
* CAL – Can be Lab Assessments, Projects, and Reports
**End Semester can be theory examination/ lab-based examination/ project presentation
Textbook(s)
Stallings W. “Cryptography and network security: principles and practice”. Upper Saddle River: Pearson; 2018. Padmanabhan TR, Shyamala C K, and Harini N. “Cryptography and Security”, First Edition, Wiley India Publications; 2011.
Reference(s)
Forouzan BA. “Cryptography & network security”. McGraw-Hill, Inc.; 2007 Feb 28.
DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.