The course deals with the underlying principles of cryptography and network security. It
develops the mathematical tools required to understand the topic of cryptography.
from the classical ciphers to modern day ciphers, the course provides an extensive coverage
of the techniques and methods needed for the proper functioning of the ciphers.
deals with the construction and cryptanalysis of block ciphers, stream ciphers and hash
The course defines one way functions and trap-door functions and presents the
construction and cryptanalysis of public key ciphers, namely RSA.
The key exchange
problem and solutions using the Diffie-Hellman algorithm are discussed. Message
Authentication Codes (MAC) and signature schemes are also detailed.
The course deals
with modern trends in asymmetric key cryptography, namely using Elliptic Curves. The
course concludes with the design rationale of network protocols for key exchange and
attacks on such protocols.
A video course shall consist of 40 or more lectures with 1 hour duration per lecture.
Introduction and Mathematical Foundations
Overview on Modern Cryptography
Probability and Information Theory
Cryptanalysis of Classical Cryptosystems
Shannon’s Theory: I
Shannon’s Theory: II
Shannon’s Theory: III
Symmetric Key Ciphers
Symmetric Key Ciphers
Modern Block Ciphers (DES)
Modern Block Cipher (AES)
Modern Block Cipher (AES) contd.
Cryptanalysis of Symmetric Key Ciphers
Other Cryptanalytic Techniques
Overview on S-Box Design Principles
Modes of operation of Block Ciphers
Stream Ciphers and Pseudorandomness
Hash Functions and MACs
Hash functions: The Merkle Damgard Construction
Message Authentication Codes (MACs)
Asymmetric Key Ciphers: Construction and Cryptanalysis
More Number Theoretic Results
The RSA Cryptosystem
Other attacks on RSA and Semantic Security of RSA
The Discrete Logarithm Problem (DLP) and the Diffie Hellman Key Exchange algorithm
The ElGamal Encryption Algorithm
Cryptanalysis of DLP
Signature schemes: I
Signature schemes: II
Modern Trends in Asymmetric Key Cryptography
Elliptic curve based cryptography: I
Elliptic curve based cryptography: II
Secret Sharing Schemes
A Tutorial on Network Protocols, Kerberos
Pretty Good Privacy (PGP)
Secure Socket Layer (SSL)
Intruders and Viruses
Discrete Structures, Algorithms.
Douglas Stinson, "Cryptography Theory and Practice", 2nd Edition, Chapman &
B. A. Forouzan, "Cryptography & Network Security", Tata Mc Graw Hill.
W. Stallings, "Cryptography and Network Security", Pearson Education.