Course Objectives:
This course enables the students to
Course Outcomes(COs):
Learning outcomes (at course level) | Learning and teaching strategies | Assessment Strategies |
CO119. Classify the various classical encryption techniques
CO120. Illustrate various Public key cryptographic techniques
CO121. Discuss key exchange and authentication applications
CO122. Evaluate the authentication and hash algorithms
CO123. Summarize the intrusion detection and its solutions to overcome the attacks.
| Approach in teaching: Interactive Lectures, Modelling, Discussions, using research papers, student centred approach, Through Video Tutorials
Learning activities for the students: Experiential Learning, Presentations, case based learning, Discussions, Quizzes and Assignments | Assignments Written test in classroom Classroom activity Continues Assessment Semester End Examination |
Introduction to security attacks: services and mechanism, classical encryption techniques- substitution ciphers and transposition ciphers, cryptanalysis, stream and block ciphers. Modern Block Ciphers: Block ciphers principals, Shannon’s theory of confusion and diffusion, fiestal structure, data encryption standard (DES), differential and linear cryptanalysis of DES, block cipher modes of operations, triple DES.
Encryption Technique: AES, RC6, random number generation. S-box theory: Boolean Function, S-box design criteria, Bent functions, Propagation and nonlinearity, construction of balanced functions, S-box design.
Public Key Cryptosystems: Principles of Public Key Cryptosystems, RSA Algorithm, security analysis of RSA, Exponentiation in Modular Arithmetic. Key Management in Public Key Cryptosystems: Distribution of Public Keys, Distribution of Secret keys using Public Key Cryptosystems. X.509 Discrete Logarithms, Diffie-Hellman Key Exchange
Message Authentication and Hash Function: Authentication requirements, authentication functions, message authentication code, hash functions, birthday attacks, security of hash functions and MAC, MD5 message digest algorithm, Secure hash algorithm(SHA). Digital Signatures: Digital Signatures, authentication protocols, digital signature standards (DSS), proof of digital signature algorithm. Remote user Authentication using symmetric and Asymmetric Authentication
Pretty Good Privacy. IP Security: Overview, IP Security Architecture, Authentication Header, Encapsulation Security Payload in Transport and Tunnel mode with multiple security associations (Key Management not Included). Strong Password Protocols: Lamport’s Hash, Encrypted Key Exchange.