Cryptography And Network Security
Offered By: Indian Institute of Technology, Kharagpur via Swayam
Course Description
Overview
The aim of this course is to introduce the student to the areas of cryptography and cryptanalysis. This course develops a basic understanding of the algorithms used to protect users online and to understand some of the design choices behind these algorithms. Our aim is to develop a workable knowledge of the mathematics used in cryptology in this course. The course emphasizes to give a basic understanding of previous attacks on cryptosystems with the aim of preventing future attacks. A wide variety of basic cryptographic primitives will be discussed along with recent developments in some advanced topics like identity-based encryption, attribute-based encryption, functional encryption, two-party/multi-party computation, bitcoin and crypto-currency and postquantum cryptography. The cryptanalysis part will help us understanding challenges for cybersecurity that includes network security, data security, mobile security, cloud security and endpoint security.
INTENDED AUDIENCE : NILLPRE-REQUISITES : NILLINDUSTRY SUPPORT : Stratign FZE, Dubai(UAE), SAG, DRDO, ISRO, WESEE, NTRO.
INTENDED AUDIENCE : NILLPRE-REQUISITES : NILLINDUSTRY SUPPORT : Stratign FZE, Dubai(UAE), SAG, DRDO, ISRO, WESEE, NTRO.
Syllabus
COURSE LAYOUT
Week 1: Introduction to cryptography, Classical Cryptosystem, Block Cipher.Week 2: Data Encryption Standard (DES), Triple DES, Modes of Operation, Stream Cipher.
Week 3: LFSR based Stream Cipher, Mathematical background, Abstract algebra, Number Theory.
Week 4: Modular Inverse, Extended Euclid Algorithm, Fermat's Little Theorem, Euler Phi-Function, Euler's theorem.
Week 5: Advanced Encryption Standard (AES), Introduction to Public Key Cryptosystem, Diffie-Hellman Key Exchange, Knapsack Cryptosystem, RSA Cryptosystem.
Week 6: Primarily Testing, ElGamal Cryptosystem, Elliptic Curve over the Reals, Elliptic curve Modulo a Prime.
Week 7: Generalized ElGamal Public Key Cryptosystem, Rabin Cryptosystem.
Week 8 : Message Authentication, Digital Signature, Key Management, Key Exchange, Hash Function.
Week 9: Cryptographic Hash Function, Secure Hash Algorithm (SHA), Digital Signature Standard (DSS).
Week 10: Cryptanalysis, Time-Memory Trade-off Attack, Differential and Linear Cryptanalysis.
Week 11: Cryptanalysis on Stream Cipher, Modern Stream Ciphers, Shamir's secret sharing and BE, Identity-based Encryption (IBE), Attribute-based Encryption (ABE).
Week 12: Side-channel attack, The Secure Sockets Layer (SSL), Pretty Good Privacy (PGP), Introduction to Quantum Cryptography, Blockchain, Bitcoin and Cryptocurrency.
Taught by
Sourav Mukhopadhyay
Tags
Related Courses
Algorithms with NumbersSaint Petersburg State University via Coursera Applied Cryptography
University of Colorado System via Coursera Asymmetric Cryptography and Key Management
University of Colorado System via Coursera Basic Cryptography and Programming with Crypto API
University of Colorado System via Coursera Bitcoin and Cryptocurrencies
University of California, Berkeley via edX