Introduction to Cryptography – Syllabus | Fifth Semester | BSc.CSIT (TU)

Download our Android App from Google Play Store and start reading Reference Notes Offline.

introduction to cryptography syllabusCourse Syllabus | BSc.CSIT
Introduction to Cryptography
Fifth Semester | Third Year
Tribhuvan University (TU)

Course Title: Introduction to Cryptography
Course no: CSC-313
Credit hours: 3
Full Marks: 70+10+20 | Pass Marks: 28+4+8
Nature of course: Theory (3 Hrs.) + Lab (3 Hrs.)
Goal: The course objective is to familiarize basic concepts of cryptography so as the students can use their understanding for information security purpose.

Course Contents:

Unit 1. Introduction [4 Hrs.]
Security, Attacks, Attack Types, Viruses, Worms, Trojan Horses, Classical Cryptography

Unit 2. Basics of Modern Cryptography [5 Hrs.]
Plaintext, Ciphertext, keys, simple ciphers, public key cryptography, digital signatures

Unit 3. Conventional Encryption / Secret Key Cryptography [10 Hrs.]
Cryptography, Cryptanalysis, Cipher Structure, Encryption Algorithms, Data Enncryption Standard (DES), International Data Encryption Algorithm (IDEA), Advanced Encryption Standard (AES), Modes of Operation, Symmetric Block Ciphers, Cipher Block Chaining (CBC), Multiple Encryption DES

Unit 4. Public Key Cryptography [6 Hrs.]
Basic Number Theory, Factorization, Diffie-Hellman Key Exchange, Public Key Cryptography Algorithms, RSA.

Unit 5. Digital Signatures [4 Hrs.]
One-time signatures, Digital Signature Standard (DSS).

Unit 6. Hashing and Message Digests [6 Hrs.]
Hashes, Motivation and applications. Cryptographically Secure Hashing, Secure Hash Algorithm (SHA), Encryption with Message Digest (MD), MD5.

Unit 7. Authentication and Public Key Infrastructure (PKI) [5 Hrs.]
Overview of Authentication Systems (Password, Address, Cryptographic), Security Handshake Pitfalls, Authentication Standards, Kerberos, PKI Trust Models.

Unit 8. Network Security [5 Hrs.]
IP Security, Web Security, Secure Socket Layer (SSL), Transport Layer Security (TLS), Different versions of SNMPs, PGP.

Text / Reference books :
1. D. R. Stinson. Cryptography: Theory and Practice. CRC Press
2. William Stallings, Network Security Essentials-Applications & Standards, Pearson.
3. Charlie Kaufman, Radia Perlman, Mike Speciner, Nework Security Private Communication in a Public World, Second Edition, 2004,Pearson.
4. Matt Bishop, Computer Security, Art and Science, Pearson
5. Bruce Schneier, Applied Cryptography, Pearson

(Visited 256 times, 1 visits today)

Posted By : Digvijay | Comment RSS | Category : Fifth Semester, Syllabus
Tag :

Post a Comment

Your email is never published nor shared. Required fields are marked *


Wordpress DMCA
Community | Toolbar | Android App | Founder/Developer : Hari Prasad Chaudhary | CSIT Portal Manager : Digvijay Chaudhary