Back close

Course Detail

Course Name Applied Cryptography
Course Code 24CY612
Program M. Tech. in Cyber Security
Semester 2
Credits 4
Campus Coimbatore

Syllabus

Syllabus

Protocols for identification and login: Interactive protocols, Password protocols, Challenge-response protocols, Schnorr’s identification protocol, zero-knowledge protocol. encryption-based protocol and its attacks, Perfect forward secrecy, Protocol based on ephemeral encryption, Attacks on insecure variations- Downgrade attack, Identity protection, One-sided authenticated key exchange, Security of authenticated key exchange protocols, Authenticated Key Exchange/PAKE. Key exchange protocol with trusted third party, Conference Key Protocols, Key Broadcasting Protocols, Federated Identity/SSO.

Objectives and Outcomes

Prerequisites

24CY603 Cryptography

 

Course Outcome
Course Outcome Bloom’s Taxonomy Level
CO 1 Examine and analyze cryptographic protocols in existing systems. L1, L2,L4
CO 2 Analyze Protocols for identification and login L2, L4, L5
CO 3 Evaluation of Authenticated Key Exchange protocols L3, L4, L5, L6
CO 4 Understanding the Conference Key Protocols and its applications L2,L4
CO 5 Analyze the effectiveness of key broadcasting protocols L2,L4

 

 

CO-PO Mapping
CO-PO Mapping
CO/PO PO 1 PO 2 PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO 10 PSO1 PSO2 PSO3
CO 1 1 2 2 2 2 1 2 2 1 1 1
CO 2 1 2 2 2 2 1 2 2 1 1 2
CO 3 1 2 2 2 2 1 2 2 1 2 2
CO 4 1 2 2 2 2 1 2 2 1 2 1
CO 5 1 2 2 2 2 1 2 2 1 2 1

Text Books / References

  1. A. J. Menezes, P. C. V. Oorschot and S. A. Vanstone, Handbook of Applied Cryptography , CRC Press, 1996.
  2. J. Pieprzyk, T. Hardjono and J. Seberry, Fundamentals of computer security , Springer, 2003.
  3. Abhijit Das and Veni Madhavan C. E., Public-key Cryptography, Theory and Practice , Pearson Education, 2009.
  4. Colin Boyd, Anish Mathuria and Douglas Stebila,. Protocols for Authentication and Key Establishment, Springer, Berlin, Heidelberg, 2020
  5. L. Dong and K. Chen, Cryptographic Protocol: Security Analysis Based on Trusted Freshness , Springer, 2012.

DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.

Admissions Apply Now