Back to Full Curriculum
CY202Semester 43 (2-1-0)Major

Cryptography & Network Security

Security services (confidentiality, integrity, authentication, non-repudiation), Classical ciphers (Caesar, Vigenère, Playfair, Hill), Cryptanalysis techniques (frequency analysis, known-plaintext attacks), Block vs....

Syllabus

01

Unit 1: Cryptography Fundamentals and Classical Techniques

Security services (confidentiality, integrity, authentication, non-repudiation), Classical ciphers (Caesar, Vigenère, Playfair, Hill), Cryptanalysis techniques (frequency analysis, known-plaintext attacks), Block vs. stream ciphers, Shannon's principles of confusion and diffusion, Modes of block cipher operation (ECB, CBC, CFB, OFB, CTR), Initialization vectors and nonce usage.

02

Unit 2: Symmetric Key Cryptography

Data Encryption Standard (DES) algorithm and cryptanalysis (differential, linear), Advanced Encryption Standard (AES) - Rijndael structure, S-boxes, key expansion, rounds structure, Block cipher modes security analysis, Key management challenges in symmetric cryptography, Key derivation functions and key stretching, Practical symmetric cipher selection criteria.

03

Unit 3: Number Theory and Public-Key Cryptography

Modular arithmetic, prime generation, Fermat/Euler theorems, Greatest Common Divisor algorithms, RSA cryptosystem (key generation, encryption/decryption, security proofs), Diffie-Hellman key exchange and man-in-the-middle attacks, Digital Signature Algorithm (DSA), Elliptic Curve Cryptography (ECC) fundamentals and advantages over RSA.

04

Unit 4: Hash Functions, MACs, and Authentication

Cryptographic hash function properties (collision resistance, preimage resistance), MD5 weaknesses and SHA-family algorithms, HMAC construction and security proofs, Message authentication codes (MACs), Digital signatures and non-repudiation, PKI concepts (certificates, CAs, CRLs), X.509 certificate format and validation.

05

Unit 5: Network Security Protocols and Applications

Transport Layer Security (TLS/SSL) handshake and cipher suites, IPsec architecture (AH, ESP, IKE), VPN protocols and tunnel modes, Email security (PGP, S/MIME), Kerberos authentication and ticket granting, Common network attacks (MITM, replay, session hijacking), Secure protocol design principles and cryptographic agility.