CS302
 
																									PRINCIPLES OF CRYPTOGRAPHY 
Objectives
	- To gain knowledge about the mathematics of the cryptographic algorithms 
 
	- To get an insight into the working of different existing cryptographic algorithms 
 
	- To learn how to use cryptographic algorithms in security 
 
 
Outcomes
	- Able to  understand the basic concepts of symmetric cryptosystem, public key cryptosystem and digital signature scheme 
 
	- Able to reason about the security of cryptographic constructions
 
	- Able to break the cryptosystems that are not secure 
 
 
Unit – I 
Number Theory:  Fermat's theorem, Cauchy 's theorem, Chinese remainder theorem, Primality testing algorithm,   Euclid's algorithm for integers,  quadratic residues, Legendre symbol,  Jacobi symbol
 
Unit – II 
Cryptography  and  cryptanalysis,  Classical  Cryptography, different  type of attack: CMA, CPA, CCA etc.,  Shannon perfect secrecy,  OTP, Pseudo random bit generators,  stream ciphers  and RC4 .
 
Unit – III 
Block ciphers: Modes of operation, DES and its variants, finite fields (2n), AES, linear and differential cryptanalysis 
 
Unit – IV 
One-way function, trapdoor one-way function, Public key cryptography, RSA cryptosystem, Diffie-Hellman key exchange algorithm, ElGamal Cryptosystem 
 
Unit – V 
Cryptographic hash functions, secure hash algorithm, Message authentication, digital signature, RSA digital signature 
 
TEXT BOOKS
	- Stinson. D. Cryptography: Theory and Practice, 3rd edition, Chapman & Hall/CRC, 2012 
 
REFERENCE
	- W. Stallings,”Cryptography and  Network Security Principles and practice”, 5/e, Pearson Education Asia, 2013 
 
	- Behrouz A. Forouzan  and  Debdeep Mukhopadhyay, “Cryptography and Network Security”, 2nd edition, Tata McGraw Hill, 2013 
 
	- Thomas Koshy, “Elementary Number Theory with Applications”, Elsevier India, 2005 
 
	- Online course: course on cryptography by Dan Boneh