Prerequisites
Elementary Number Theory, Arithmetic functions, Congruence, Algebraic Structures – Groups, Rings, Fields
Stream ciphers: Pseudo-random generators, Attacks on the one time pad, Linear generators, Cryptanalysis of linear congruential generators, Block ciphers: Pseudorandom functions and permutations (PRFs and PRPs), PRP under chosen plaintext attack and chosen ciphertext attack, Case study: DES, AES, modes of operation . Message integrity: Cryptographic hash functions, message authentication code, CBC MAC and its security, Cryptographic hash functions based MACs. Authenticated Encryption-Authenticated encryption ciphers from generic composition, Public key encryption: RSA, Diffie-Hellman key exchange protocol, ElGamal encryption, Elliptic curve cryptography. Digital signatures: Generic signature schemes, RSA, ElGamal and Rabin’s signature schemes, blind signatures, threshold signature schemes, ECDSA, Signcryption, Homomorphic encryption, Order preserving encryption, searchable encryption.
Course Outcome
Course Outcome | Bloom’s Taxonomy Level | |
CO1 | Comprehend fundamental cryptographic primitives and their applications. | L1,L2 |
CO2 | Understand the strengths and weaknesses of different ciphers, hash functions, and message authentication methods. | L2,L3,L4 |
CO3 | Understand public key cryptosystem and key management. | L1,L3,L5 |
CO4 | Understand digital signatures, homomorphic encryption, order-preserving, and searching encryption. | L2, L5,L6 |
CO-PO Mapping
CO-PO Mapping |
||||||||||||||
CO/PO |
PO 1 | PO 2 | PO 3 | PO 4 | PO 5 | PO 6 | PO 7 | PO 8 | PO 9 | PO 10 | PSO1 | PSO2 | PSO3 | |
CO 1 | 1 | 2 | 2 | 1 | 2 | 1 | – | 1 | 2 | – | 1 | 1 | 1 | |
CO 2 | 1 | 2 | 2 | 1 | 2 | 1 | – | 1 | 2 | – | 2 | 2 | 2 | |
CO 3 | 1 | 2 | 2 | 1 | 2 | 1 | – | 1 | 2 | – | 2 | 2 | 2 | |
CO 4 | 1 | 2 | 2 | 1 | 2 | 1 | – | 1 | 2 | – | 2 | 2 | 2 |