SlideShare a Scribd company logo
1 of 3
Description and Goals
The course will start with a review of necessary background topics such as number theory, basic
conventional encryption methods, basic public key cryptosystems, basic digital signature systems,
and zero knowledge proof systems. We will then discuss applications of cryptography in different
fields, such as wireless sensor networking, RFID, mesh networks, cloud computing, mobile
computing, and social networks. New and emerging topics in both theoretical research and
applications will be presented as well.
The course deals with the underlying principles of cryptography and network security. It develops
the mathematical tools required to understand the topic of cryptography. Starting from the classical
ciphers to modern day ciphers, the course provides an extensive coverage of the techniques and
methods needed for the proper functioning of the ciphers. The course deals with the construction
and cryptanalysis of block ciphers, stream ciphers and hash functions. The course defines one way
functions and trap-door functions and presents the construction and cryptanalysis of public key
ciphers, namely RSA. The key exchange problem and solutions using the Diffie-Hellman
algorithm are discussed. Message Authentication Codes (MAC) and signature schemes are also
detailed. The course deals with modern trends in asymmetric key cryptography, namely using
Elliptic Curves. The course concludes with the design rationale of network protocols for key
exchange and attacks on such protocols.
The goal of the course is to provide students with the necessary foundations to apply cryptography
techniques in new and emerging fields. The focus of this class is to discuss and understand the
security challenges in emerging systems, and wireless networks.
Weekly Plan Module Topics
Week-1-2 Introduction and Mathematical
Foundations
Introduction
Overview on Modern Cryptography
Number Theory
Probability and Information Theory
Week-3-4 Classical Cryptosystems Classical Cryptosystems
Cryptanalysis of Classical
Cryptosystems
Shannon’s Theory: I
Shannon’s Theory: II
Shannon’s Theory: III
Week-5-6 Symmetric Key Ciphers Symmetric Key Ciphers
Modern Block Ciphers (DES)
Modern Block Cipher (AES)
Modern Block Cipher (AES) contd.
Week-7-8 Cryptanalysis of Symmetric
Key Ciphers
Linear Cryptanalysis
Differential Cryptanalysis
Other Cryptanalytic Techniques
Overview on S-Box Design Principles
Modes of operation of Block Ciphers
Week-9 Stream Ciphers and
Pseudorandomness
Stream Ciphers
Pseudorandom functions
Week-10 Hash Functions and MACs Hash functions: The Merkle Damgard
Construction
Message Authentication Codes
(MACs)
Week-11 Asymmetric Key Ciphers:
Construction and Cryptanalysis
More Number Theoretic Results
The RSA Cryptosystem
Primality Testing
Factoring Algorithms
Other attacks on RSA and Semantic
Security of RSA
The Discrete Logarithm Problem
(DLP) and the Diffie Hellman Key
Exchange algorithm
The ElGamal Encryption Algorithm
Cryptanalysis of DLP
Week-12-13 Digital Signatures Signature schemes: I
Signature schemes: II
Week-14-15 Modern Trends in Asymmetric
Key Cryptography
Elliptic curve based cryptography: I
Elliptic curve based cryptography: II
Week-16 Network Security Secret Sharing Schemes
A Tutorial on Network Protocols,
Kerberos
Pretty Good Privacy (PGP)
Secure Socket Layer (SSL)
Intruders and Viruses
Firewalls
Network Security Books:
1. Cryptography and Network Security: Principles and Practice, by William Stallings , Prentice
Hall, Hardcover. Fifth Edition is out also. See http://williamstallings.com/Crypto3e/Crypto3e-
student.htmlfor student online help.
2. Network Security Essentials: Applications and Standards, by William Stallings. Prentice Hall,
Hardcover, Published November 1999, 366 pages, ISBN 0130160938
Course outlines

More Related Content

What's hot

Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-CommerceHiep Luong
 
PRIVATE OVER-THRESHOLD AGGREGATION PROTOCOLS OVER DISTRIBUTED DATASETS
PRIVATE OVER-THRESHOLD AGGREGATION PROTOCOLS OVER DISTRIBUTED DATASETSPRIVATE OVER-THRESHOLD AGGREGATION PROTOCOLS OVER DISTRIBUTED DATASETS
PRIVATE OVER-THRESHOLD AGGREGATION PROTOCOLS OVER DISTRIBUTED DATASETSNexgen Technology
 
Cryptography and network security
Cryptography and network security Cryptography and network security
Cryptography and network security Mathan Gopal
 
Cryptography and attacks ins
Cryptography and attacks insCryptography and attacks ins
Cryptography and attacks insAstha Parihar
 
Rothke Info Security Canada 2007 Final
Rothke   Info Security Canada 2007 FinalRothke   Info Security Canada 2007 Final
Rothke Info Security Canada 2007 FinalBen Rothke
 
Effective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networksEffective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networksLogicMindtech Nologies
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptographyRahulprasad Yadav
 
Network Security(Symmetric Ciphers)
Network Security(Symmetric Ciphers)Network Security(Symmetric Ciphers)
Network Security(Symmetric Ciphers)Gayathridevi120
 
Detection of Various Attacks Using Zero Knowledge Protocol in Wireless Security
Detection of Various Attacks Using Zero Knowledge Protocol in Wireless SecurityDetection of Various Attacks Using Zero Knowledge Protocol in Wireless Security
Detection of Various Attacks Using Zero Knowledge Protocol in Wireless Securityijceronline
 
A Literature Review of Some Modern RSA Variants
A Literature Review of Some Modern RSA VariantsA Literature Review of Some Modern RSA Variants
A Literature Review of Some Modern RSA Variantsijsrd.com
 
Wireless Communication Research Projects Assistance
Wireless Communication Research Projects AssistanceWireless Communication Research Projects Assistance
Wireless Communication Research Projects AssistanceNetwork Simulation Tools
 

What's hot (18)

Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
 
QF_Dr_Preneel
QF_Dr_PreneelQF_Dr_Preneel
QF_Dr_Preneel
 
Cryptography
CryptographyCryptography
Cryptography
 
PRIVATE OVER-THRESHOLD AGGREGATION PROTOCOLS OVER DISTRIBUTED DATASETS
PRIVATE OVER-THRESHOLD AGGREGATION PROTOCOLS OVER DISTRIBUTED DATASETSPRIVATE OVER-THRESHOLD AGGREGATION PROTOCOLS OVER DISTRIBUTED DATASETS
PRIVATE OVER-THRESHOLD AGGREGATION PROTOCOLS OVER DISTRIBUTED DATASETS
 
Chapter 1 2
Chapter 1 2Chapter 1 2
Chapter 1 2
 
Cryptography and network security
Cryptography and network security Cryptography and network security
Cryptography and network security
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
 
Ccc brochure
Ccc brochureCcc brochure
Ccc brochure
 
Cryptography and attacks ins
Cryptography and attacks insCryptography and attacks ins
Cryptography and attacks ins
 
Rothke Info Security Canada 2007 Final
Rothke   Info Security Canada 2007 FinalRothke   Info Security Canada 2007 Final
Rothke Info Security Canada 2007 Final
 
Effective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networksEffective key management in dynamic wireless sensor networks
Effective key management in dynamic wireless sensor networks
 
Cn ppt
Cn pptCn ppt
Cn ppt
 
Encryption
EncryptionEncryption
Encryption
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Network Security(Symmetric Ciphers)
Network Security(Symmetric Ciphers)Network Security(Symmetric Ciphers)
Network Security(Symmetric Ciphers)
 
Detection of Various Attacks Using Zero Knowledge Protocol in Wireless Security
Detection of Various Attacks Using Zero Knowledge Protocol in Wireless SecurityDetection of Various Attacks Using Zero Knowledge Protocol in Wireless Security
Detection of Various Attacks Using Zero Knowledge Protocol in Wireless Security
 
A Literature Review of Some Modern RSA Variants
A Literature Review of Some Modern RSA VariantsA Literature Review of Some Modern RSA Variants
A Literature Review of Some Modern RSA Variants
 
Wireless Communication Research Projects Assistance
Wireless Communication Research Projects AssistanceWireless Communication Research Projects Assistance
Wireless Communication Research Projects Assistance
 

Similar to Course outlines

Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithmpaperpublications3
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherAashirwad Kashyap
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherAashirwad Kashyap
 
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMSANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMSJournal For Research
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...editor1knowledgecuddle
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographicijcsa
 
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...IJECEIAES
 
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...ams1ams11
 
10.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.1210.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.12Arindam Paul
 
DOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYDOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYTuhin_Das
 
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...caijjournal
 
Cryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewFaith Nweke
 
Computer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxComputer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxmagoigamtatiro1
 
Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6FRSecure
 
Techniques of lattice based
Techniques of lattice basedTechniques of lattice based
Techniques of lattice basedijcsa
 
researchpaperfinal1
researchpaperfinal1researchpaperfinal1
researchpaperfinal1Sumit Bajaj
 
survey paper on object oriented cryptographic security for runtime entities
survey paper on object oriented cryptographic security for runtime entitiessurvey paper on object oriented cryptographic security for runtime entities
survey paper on object oriented cryptographic security for runtime entitiesINFOGAIN PUBLICATION
 

Similar to Course outlines (20)

H42063743
H42063743H42063743
H42063743
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithm
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMSANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographic
 
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
 
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
 
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash FunctionsCRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
CRYPTOGRAPHY & NETWORK SECURITY- Cryptographic Hash Functions
 
10.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.1210.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.12
 
DOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYDOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITY
 
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Cryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
Cryptoandnetworksecuritylitreview
 
Computer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptxComputer Cryptography and Encryption [by: Magoiga].pptx
Computer Cryptography and Encryption [by: Magoiga].pptx
 
Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6
 
Techniques of lattice based
Techniques of lattice basedTechniques of lattice based
Techniques of lattice based
 
researchpaperfinal1
researchpaperfinal1researchpaperfinal1
researchpaperfinal1
 
survey paper on object oriented cryptographic security for runtime entities
survey paper on object oriented cryptographic security for runtime entitiessurvey paper on object oriented cryptographic security for runtime entities
survey paper on object oriented cryptographic security for runtime entities
 

More from Asad Ali

Echo housing system
Echo housing systemEcho housing system
Echo housing systemAsad Ali
 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Asad Ali
 
Attacks Attacks AND Attacks!
Attacks Attacks AND Attacks!Attacks Attacks AND Attacks!
Attacks Attacks AND Attacks!Asad Ali
 
block ciphers
block ciphersblock ciphers
block ciphersAsad Ali
 
Ciphers modes
Ciphers modesCiphers modes
Ciphers modesAsad Ali
 
One time pad Encryption:
One time pad Encryption:One time pad Encryption:
One time pad Encryption:Asad Ali
 
History of Cipher System
History of Cipher SystemHistory of Cipher System
History of Cipher SystemAsad Ali
 
Numerical Analysis (Solution of Non-Linear Equations)
Numerical Analysis (Solution of Non-Linear Equations)Numerical Analysis (Solution of Non-Linear Equations)
Numerical Analysis (Solution of Non-Linear Equations)Asad Ali
 
Numerical Analysis (Solution of Non-Linear Equations) part 2
Numerical Analysis (Solution of Non-Linear Equations) part 2Numerical Analysis (Solution of Non-Linear Equations) part 2
Numerical Analysis (Solution of Non-Linear Equations) part 2Asad Ali
 
Nation state system
Nation state systemNation state system
Nation state systemAsad Ali
 
Ir meaning, nature and importance
Ir  meaning, nature and importanceIr  meaning, nature and importance
Ir meaning, nature and importanceAsad Ali
 
Mathematical operations in image processing
Mathematical operations in image processingMathematical operations in image processing
Mathematical operations in image processingAsad Ali
 
Bit plane slicing
Bit plane slicingBit plane slicing
Bit plane slicingAsad Ali
 

More from Asad Ali (14)

Echo housing system
Echo housing systemEcho housing system
Echo housing system
 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)
 
Attacks Attacks AND Attacks!
Attacks Attacks AND Attacks!Attacks Attacks AND Attacks!
Attacks Attacks AND Attacks!
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Ciphers modes
Ciphers modesCiphers modes
Ciphers modes
 
One time pad Encryption:
One time pad Encryption:One time pad Encryption:
One time pad Encryption:
 
History of Cipher System
History of Cipher SystemHistory of Cipher System
History of Cipher System
 
Numerical Analysis (Solution of Non-Linear Equations)
Numerical Analysis (Solution of Non-Linear Equations)Numerical Analysis (Solution of Non-Linear Equations)
Numerical Analysis (Solution of Non-Linear Equations)
 
Numerical Analysis (Solution of Non-Linear Equations) part 2
Numerical Analysis (Solution of Non-Linear Equations) part 2Numerical Analysis (Solution of Non-Linear Equations) part 2
Numerical Analysis (Solution of Non-Linear Equations) part 2
 
Nation state system
Nation state systemNation state system
Nation state system
 
Ir meaning, nature and importance
Ir  meaning, nature and importanceIr  meaning, nature and importance
Ir meaning, nature and importance
 
Mathematical operations in image processing
Mathematical operations in image processingMathematical operations in image processing
Mathematical operations in image processing
 
Bit plane slicing
Bit plane slicingBit plane slicing
Bit plane slicing
 
Auto-Lab
Auto-LabAuto-Lab
Auto-Lab
 

Recently uploaded

定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxBipin Adhikari
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 

Recently uploaded (20)

定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptx
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 

Course outlines

  • 1. Description and Goals The course will start with a review of necessary background topics such as number theory, basic conventional encryption methods, basic public key cryptosystems, basic digital signature systems, and zero knowledge proof systems. We will then discuss applications of cryptography in different fields, such as wireless sensor networking, RFID, mesh networks, cloud computing, mobile computing, and social networks. New and emerging topics in both theoretical research and applications will be presented as well. The course deals with the underlying principles of cryptography and network security. It develops the mathematical tools required to understand the topic of cryptography. Starting from the classical ciphers to modern day ciphers, the course provides an extensive coverage of the techniques and methods needed for the proper functioning of the ciphers. The course deals with the construction and cryptanalysis of block ciphers, stream ciphers and hash functions. The course defines one way functions and trap-door functions and presents the construction and cryptanalysis of public key ciphers, namely RSA. The key exchange problem and solutions using the Diffie-Hellman algorithm are discussed. Message Authentication Codes (MAC) and signature schemes are also detailed. The course deals with modern trends in asymmetric key cryptography, namely using Elliptic Curves. The course concludes with the design rationale of network protocols for key exchange and attacks on such protocols. The goal of the course is to provide students with the necessary foundations to apply cryptography techniques in new and emerging fields. The focus of this class is to discuss and understand the security challenges in emerging systems, and wireless networks. Weekly Plan Module Topics Week-1-2 Introduction and Mathematical Foundations Introduction Overview on Modern Cryptography Number Theory Probability and Information Theory Week-3-4 Classical Cryptosystems Classical Cryptosystems Cryptanalysis of Classical Cryptosystems Shannon’s Theory: I Shannon’s Theory: II Shannon’s Theory: III Week-5-6 Symmetric Key Ciphers Symmetric Key Ciphers Modern Block Ciphers (DES) Modern Block Cipher (AES) Modern Block Cipher (AES) contd. Week-7-8 Cryptanalysis of Symmetric Key Ciphers Linear Cryptanalysis Differential Cryptanalysis
  • 2. Other Cryptanalytic Techniques Overview on S-Box Design Principles Modes of operation of Block Ciphers Week-9 Stream Ciphers and Pseudorandomness Stream Ciphers Pseudorandom functions Week-10 Hash Functions and MACs Hash functions: The Merkle Damgard Construction Message Authentication Codes (MACs) Week-11 Asymmetric Key Ciphers: Construction and Cryptanalysis More Number Theoretic Results The RSA Cryptosystem Primality Testing Factoring Algorithms Other attacks on RSA and Semantic Security of RSA The Discrete Logarithm Problem (DLP) and the Diffie Hellman Key Exchange algorithm The ElGamal Encryption Algorithm Cryptanalysis of DLP Week-12-13 Digital Signatures Signature schemes: I Signature schemes: II Week-14-15 Modern Trends in Asymmetric Key Cryptography Elliptic curve based cryptography: I Elliptic curve based cryptography: II Week-16 Network Security Secret Sharing Schemes A Tutorial on Network Protocols, Kerberos Pretty Good Privacy (PGP) Secure Socket Layer (SSL) Intruders and Viruses Firewalls Network Security Books: 1. Cryptography and Network Security: Principles and Practice, by William Stallings , Prentice Hall, Hardcover. Fifth Edition is out also. See http://williamstallings.com/Crypto3e/Crypto3e- student.htmlfor student online help. 2. Network Security Essentials: Applications and Standards, by William Stallings. Prentice Hall, Hardcover, Published November 1999, 366 pages, ISBN 0130160938