About Me

header ads

Data Security (BEC613B)

Data Security

Course Code BEC613B 
CIE Marks 50
Teaching Hours/Week (L:T:P: S) 3:0:0:0 
SEE Marks 50
Total Hours of Pedagogy 40 hours Theory 
Total Marks 100



MODULE-1

Classical Encryption Techniques: Symmetric cipher model, Substitution techniques (excluding Hill cipher) (Text 1: Chapter 1: Section 1, 2)

Block Ciphers: Traditional Block Cipher structure, (Text 1: Chapter 2: Section1) The AES Cipher. (Text 1: Chapter 4: Section 2,4) Block Cipher Modes of Operation (Text 1: Chapter 5: Section 2, 3, 4, 5, 6)



MODULE-2

Basic Concepts of Number Theory and Finite Fields: Divisibility and The Division Algorithm Euclidean algorithm, Modular arithmetic, Groups, Rings and Fields, Finite fields of the form GF(p), Polynomial Arithmetic, Fields of the Form GF(2m) (Text 1: Chapter 3)



MODULE-3

More on Number Theory: Prime Numbers, Fermat’s and Euler’s theorem, discrete logarithm. (Text 1: Chapter 7: Section 1, 2, 5)

ASYMMETRIC CIPHERS: Principles of Public-Key Cryptosystems, The RSA algorithm (Text 1: Chapter 8: Section 1, 2), Diffie – Hellman Key Exchange, Elliptic Curve Arithmetic over Zp, Elliptic Curve Cryptography



MODULE-4

Cryptographic Hash Functions: Application of Hash Functions, Two Simple Hash Functions, Requirements and Security, Hash function based on Cipher Block Chaining, SHA-512 (Only structural description). 

Message Authentication Codes: Message Authentication Functions, Security of MACs, MACs based on Hash Functions. 



MODULE-5

Digital Signatures: Digital Signatures, NIST Digital Signature Algorithm, Elliptic Curve Digital Signature Algorithm. 

Key Management and Distribution: Symmetric Key Distribution Using Symmetric Encryption, Symmetric Key Distribution Using Asymmetric Encryption, Distribution of Public Keys 



Suggested Learning Resources:

Text Book

1. William Stallings, “Cryptography and Network Security Principles and Practice”, Pearson Education Inc., 6th Edition, 2014, ISBN: 978-93-325-1877-3


Reference Books

1. Bruce Schneier, “Applied Cryptography Protocols, Algorithms, and Source code in C”, Wiley Publications, 2nd Edition, ISBN: 9971-51-348-X.

2. Cryptography and Network Security, Behrouz A Forouzan, TMH, 2007.

Post a Comment

0 Comments