This document provides an overview of the topics covered in the course CS8792 – Cryptography and Network Security. It discusses the foundations of modern cryptography and how it provides the key to advanced computer and communication security. Modern cryptography is based on ideas from mathematics like number theory and computational complexity theory. It also discusses the differences between traditional and modern encryption techniques. The types of modern cryptography covered are symmetric key encryption and asymmetric key encryption. It defines perfect security as a cryptosystem where the ciphertext conveys no information about the plaintext. Information theory concepts like entropy and conditional probability are also introduced.
2. Unit I - Introduction
Topic Teaching Aid Activity
Security trends -
Legal, Ethical and Professional Aspects of Security
PPT -
Need for Security at Multiple levels, Security Policies PPT -
Model of network security,
Security attacks, services and mechanism,
OSI security architecture
PPT Quiz
Classical Encryption techniques (Symmetric cipher model, substitution
techniques, transposition techniques, steganography)
WB Worksheet
Foundations of modern cryptography: perfect security, information
theory, product cryptosystem, cryptanalysis
PPT Worksheet
3. Foundations of modern cryptography
Key to advanced computer and
communication security
completely based on the ideas of mathematics
number theory + computational complexity
theory + probability
4. Traditional Encryption Modern Encryption
Manipulation is done in the
characters of the plaintext
Operations are
performed on binary bit
sequence
Requires cryptosystem for
communicating Confidentiality
Securely possess secret key
Security through
obscurity
publicly known mathematical
algorithm
Secured secret key
5. Types of Modern Cryptography
Symmetric key encryption - RC4, AES, DES,
Blowfish, 3DES
Asymmetric Key Encryption - Diffie-Hellman
and RSA algorithm