At the end of this course, the students; 1) Know the cryptographic algorithms and techniques, as well as underlying mathematics. 2) Estimate the possible attacks and the potential threats due to security design flaws. 3) Implement the cryptographic algorithms in software. 4) Ability to implement key control, key distribution, and key exchange algorithms. 5) Ability to state security protocol failures. 6) Ability to work in a cryptography project and present it.
MODE OF DELIVERY
Face to face
PRE-REQUISITES OF THE COURSE
No
RECOMMENDED OPTIONAL PROGRAMME COMPONENT
None
COURSE DEFINITION
Introduction to Cryptography; Classical Cryptography; Symmetric and Asymmetric Encryption; DES; AES; RSA Problem; Diffie Hellman Key Exchange; Rabin; ElGamal; Pseudo-Random Bits; Cryptographic Hash Functions; Message Authentication Codes; Digital Signature; Principles of Authentication Protocols; Authentication in Real Worlds.
COURSE CONTENTS
WEEK
TOPICS
1st Week
Introduction to Cryptography;
2nd Week
Classical Cryptography;
3rd Week
Symmetric and Asymmetric Encryption;
4th Week
DES; AES; RSA Problem;
5th Week
Diffie Hellman Key Exchange;
6th Week
Rabin;
7th Week
ElGamal;
8th Week
Mid-term
9th Week
Pseudo-Random Bits;
10th Week
Cryptographic Hash Functions;
11th Week
Message Authentication Codes;
12th Week
Digital Signature;
13th Week
Principles of Authentication Protocols;
14th Week
Authentication in Real Worlds.
RECOMENDED OR REQUIRED READING
1. Stinson, Douglas, R. "Cyrptography: Theory and Practice", CRC Press, (1995) 2. Schneier, B. "Applied Crytography", Wiley, 1996 3. Stallings, W. "Cryptography and Network Security: Principles and Practice", Prentice Hall, (2010) 4. Menezes, A. , Vanstone, S. and Orschot, P. "Handbook of Applied Cryptography with Coding Theory", Pearson, (2006)