You are on page 1of 4

BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE, Pilani

Pilani Campus
Instruction Division
First Semester (2014-2015)
Course Handout (Part II)
In addition to part-I (General handout for all courses appended to the timetable) this portion
provides further details regarding the course.
Course No.
Course Title
Instructor-In-Charge

: BITS F463
: Cryptography
: SK Hafizul Islam

Scope and Objectives


This course will give you the brief ideas about cryptographic techniques and their applications in
Information Security. In this course, we will learn the design and analysis of mathematical
techniques employed in cryptography. In addition, some basics of Number Theory will be
discussed, which are required to understand the mathematical background of various
cryptographic techniques.
Text Books
[T1] B. A. Forouzan, D. Mukhopadhyay: Cryptography and Network Security, 2e, McGraw-Hill.
[T2] W. Stallings: Cryptography and Network Security, 5e, Pearson.

References
[R1] H. Delf, H. Knebl: Introduction to Cryptography, Principles and Applications. Springer
(India), 2nd Ed., 2006.
[R2] J. Buchmann: Introduction to Cryptography. Springer, 2e, 2006.
[R3] W. Trappe, L. C. Washington:Introduction to Cryptography with Coding Theory, 2/E,
Pearson.
[R4] D. R. Stinson: Cryptography: Theory and Practice (Discrete Mathematics and Its
Applications), 3e, CRC Press.
[R5] B. Schneier: Applied cryptography: protocols, algorithms, and source code in C, 2e, John
Wiley & Sons.
[R6] J. Katz, Y. Lindell: Introduction to Modern Cryptography", Chapman & Hall/CRC.
[R7] A. J. Menezes, P. C. V. Oorschot, S. A. Vanstone: Handbook of Applied Cryptography, CRC
Press.

Please Consider Your Environmental Responsibilities


Do Not Print Unless Necessary

BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE, Pilani


Pilani Campus
Lecture Plan
Topics
Introduction: Security goals, Cryptographic attacks, Security services, Security
mechanism
Number Theory: Divisibility, Division Algorithm, Euclidean Algorithm,
Modular Arithmetic, Groups, Rings, Fields
Symmetric Key Cryptography
Classical Encryption Techniques: Symmetric Cipher, Substitution
Techniques, Transposition Techniques
Symmetric Key Cryptography
Block Ciphers and the Data Encryption Standard: Block Cipher Principles,
Data Encryption Standard (DES), Block Cipher Design Principles
Symmetric Key Cryptography
Advanced Encryption Standard: AES Structure, AES Round Functions, AES
Key Expansion
Symmetric Key Cryptography
Block Cipher Operation: Multiple Encryption, Triple DES, Electronic
Codebook Mode, Cipher Block Chaining Mode, Cipher Feedback Mode, Output
Feedback Mode
Number Theory: Prime Numbers, Fermats and Eulers Theorems, Testing for
Primality, The Chinese Remainder Theorem, DLP
Public-Key Cryptography
Introduction: Principles of Public-Key Cryptosystems, RSA, Diffie-Hellman Key
Exchange, ElGamal Cryptosystem, Elliptic Curve Cryptography,
Public-Key Cryptography
Cryptographic Hash Functions: Applications, Examples, Requirements and
Security, Hash Functions Based on Cipher Block Chaining, Secure Hash
Algorithm (SHA)
Public-Key Cryptography
Message Authentication Codes: Message Authentication Requirements,
Message Authentication Functions, Message Authentication Codes, Security of
MACs, HMAC
Public-Key Cryptography:
Digital Signatures: Digital Signatures, ElGamal Digital Signature Scheme,
Schnorr Digital Signature Scheme, Digital Signature Standard (DSS)
Public-Key Cryptography:
Key Management and Distribution: Symmetric Key Distribution Using
Symmetric Encryption, Symmetric Key Distribution Using Asymmetric
Encryption, Distribution of Public Keys, X.509 Certificates, PKI
Please Consider Your Environmental Responsibilities
Do Not Print Unless Necessary

No. of Class
2
3
3
2
3
2
2
6
4
3
5
3

BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE, Pilani


Pilani Campus
Public-Key Cryptography:
Authentication Protocols: Remote User Authentication Principles, Remote
User Authentication Using Symmetric Encryption, etc.
Public-Key Cryptography:
Concept of Perfect Security, Provable Security, etc.

Evaluation Plan:
Sl.
Component & Nature
No.
1.
Mid-Sem. Exam. (Closed Book)
2.
Research
Project/Assignment/Quiz
3.
End-Sem. Exam (Open &
Closed Book)

Weightage
30%
20%
50%

Duration

4
2

Date & Time

1 Hrs. 30 Mins. 9/10 8:00 - 9:30 AM


Details will be announced in the class
3 Hrs.

5/12 FN

Note: All course notices will be displayed on the IPC/CSIS Notice Board only.
Make-up Policy: No makeup will be given to Project/Assignment/Quiz. For tests, however,
Make-up will be granted strictly on prior permission and on justifiable grounds only. Students
applying for make-up on medical grounds need to submit a confirmation letter from the
concerned warden as well as from a doctor.
Chamber Consultation Hour: Would be announced in the class.
Malpractice Regulations: The following regulations are supplementary to BITS-wide
policies regarding malpractices:
1. Any student or team of students involved/found involved in malpractices in
working out assignments / projects will be awarded a zero for that assignment /
project and will be blacklisted.
2. Any student or team of students found repeatedly more than once across all
courses involved in malpractices will be reported to the Disciplinary
Committee for further action. This will be in addition to the sanction mentioned
above.
3. A malpractice - in this context - will include, but not be limited to:
- Submitting some other students / teams solution(s) as ones own;
- Copying some other students / teams data or code or other forms of a
solution;

Please Consider Your Environmental Responsibilities


Do Not Print Unless Necessary

BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE, Pilani


Pilani Campus
- Seeing some other students / teams data or code or other forms of a
solution;
- Permitting some other student / team to see or copy or submit ones own
solution;
- or other equivalent forms of plagiarism wherein the student or team does
not work out the solution and use some other solution or part thereof (such as
downloading it from the LAN or the Web).
4. The degree of malpractice (the size of the solution involved or the number of
students involved) will not be considered toward mitigating evidence. Failure
on the part of instructor(s) to detect malpractice at or before the time of
evaluation may not prevent sanctions based on later evidence.
5. In this context, a malpractice does NOT include the following:
a. Asking help from a third person doubts, as long as there is no overt or covert
intend/attempt to positively contribute towards the solution of
Assignment/Project.
b. Pointing out compilation errors. (As long as there is no active contribution to
the semantics of the code.)
Either case, the fact that help was sought must be acknowledged while
submitting the work
Date: 27/07/2014

Instructor-In-Charge
BITS F463

Please Consider Your Environmental Responsibilities


Do Not Print Unless Necessary

You might also like