Teaching Scheme (in Hours)
Subject Credit : 5
Examination Scheme (in marks)
ESE Viva (V)
Syllabus Content Download
Symmetric Cipher Model, Cryptography, Cryptanalysis and Attacks; Substitution and Transposition techniques.
Stream ciphers and block ciphers, Block Cipher structure, Data Encryption standard (DES) with example, strength of DES, Design principles of block cipher, AES with structure, its transformation functions, key expansion, example and implementation.
Multiple encryption and triple DES, Electronic Code Book, Cipher Block Chaining Mode, Cipher Feedback mode, Output Feedback mode, Counter mode.
Public Key Cryptosystems with Applications, Requirements and Cryptanalysis, RSA algorithm, its computational aspects and security, Diffie-Hillman Key Exchange algorithm, Man-in-Middle attack.
Cryptographic Hash Functions, their applications, Simple hash functions, its requirements and security, Hash functions based on Cipher Block Chaining, Secure Hash Algorithm (SHA).
Message Authentication Codes, its requirements and security, MACs based on Hash Functions, Macs based on Block Ciphers.
Digital Signature, its properties, requirements and security, various digital signature schemes (Elgamal and Schnorr), NIST digital Signature algorithm.
Key management and distribution, symmetric key distribution using symmetric and asymmetric encryptions, distribution of public keys, X.509 certificates, Public key infrastructure.
Remote user authentication with symmetric and asymmetric encryption, Kerberos.
Software Flaws and Malware : Introduction, Software Flaws, Buffer overflow, Incomplete Mediation, Race Conditions Malware, Brain, Morris Worm, Code red, SQL Slammer, Trojan Example, Malware Detection, The Future of Malware, Cyber Disease versus Biological diseases, Miscellaneous software-based Attacks, Salami Attacks, Linearization, Time bombs, Trusting Software Insecurity in software: Software Reverse Engineering, Anti-disassembly Techniques, Anti-Debugging Techniques Software Tamper Resistance: Guards, Obfuscation, Metamorphism Revisited.
After learning the course the students should be able to:
- Define the concepts of Information security and their use.
- Describe the principles of symmetric and asymmetric cryptography.
- Understand and apply the various symmetric key algorithms.
- Understand and apply the various asymmetric key algorithms.
- Understand the concepts of hashing with algorithms and apply them.
- Understand and use the message authentication and its requirement.
- Understand the concepts of digital signature and digital certificates.
- List and explain various digital signature algorithms.
- Understand and use the various key management and remote authentication mechanisms.
- Understand the concept of malware technology and its impacts.
Darshan Institute of Engineering & Technology is a leading institute offering undergraduate (B.E.), postgraduate (M.E.) and Diploma programs in engineering.