Professional Documents
Culture Documents
CP402
Date Lectures Topics Objectives
Thu
1/4
Introduction to
security attacks,
services and
mechanism,
introduction to
cryptography
Conventional
Encryption:
Conventional
encryption model,
classical
encryption
techniquessubstitution
goals
To define security
services and how they are
related to the three
security goals
To define security
mechanisms to provide
security services
To introduce two
techniques, cryptography
and steganography, to
implement security
mechanisms.
To define Security
Models.
Explain Classical
Encryption Techniques
Introduce basic concepts
& terminology of
encryption
Stallings,
Chapter 2
Forouzan
Chapter 3
Graded
Assignment
1.
ciphers and
transposition
ciphers,
cryptanalysis,
stereography,
stream and block
ciphers.
Various
Students will be able to write
algorithms and
their own simple algorithms
Examples
Substitution
Ciphers, Additive
Cipher, Shift
Cipher and Caesar
Cipher,
To know various substitution
Multiplicative
cipher and transposition cipher
Ciphers ,
algorithms
Monoalphabetic
Substitution
Cipher, Playfair
Cipher,
Hill Cipher,
transposition
cipher Algorithms
block cipher
modes of
operations
Tue
1/9
Stallings,
Chapter 2
Festal structure, DES having the following Students will able to run DES Stallings,
using their own plain text
Chapter 3
data encryption objectives
They
can
differentiate
the
use
of
standard(DES), 1. High level of security.
strength of DES, 2. Completely specified and private key and public key
process
differential and
easy to understand
linear crypt
3. Cryptographic security
analysis of DES,
block cipher
modes of
4.
operations, triple
DES,
5.
do not depend on
algorithm secrecy
Adaptable to diverse
applications
Efficient
Encryption
Example of DES
Students can encrypt own text
The block cipher IDEA
using IDEA algorithm
operates with 64-bit
IDEA encryption plaintext and cipher text
and decryption, blocks and is controlled by
a 128-bit key.
strength of
To know the structure of the
IDEA
algorithm (different key subblocks are used)
Stallings,
Chapter 4
confidentiality
using
conventional
encryption,
traffic
confidentiality,
key distribution,
random number
generation
Stallings,
Chapter 4
Introduction to
graph, ring and
field
Stallings,
Chapter 4
Stallings,
Chapter 8
Eulers theorem,
primality testing,
theorem,
primality testing,
Euclids
Algorithm,
Chinese
Remainder
theorem, discrete
logarithms.
Principals of
public key
crypto systems,
RSA algorithm,
Thu
security of RSA,
1/11
key management
Stallings,
Chapter 8
Stallings,
Homework 1 out.
Chapter 9
Diffle-Hellman
key exchange
algorithm,
Stallings,
Chapter 10
Introductory
idea of Elliptic
curve
cryptography,
Elganel
encryption.
Stallings,
Chapter 10