Syllabus - Data Security (CY503 (C))


CSE-Cyber Security/Cyber Security

Data Security (CY503 (C))

V-Semester

Unit-1

Introduction

History of Cryptography. Mathematical background: Probability theory - theory. Symmetric (Private) Key theory, Number Information Cryptographic Systems: Caesar – Aff ine – Monoalphabetic Substitution – Transposition – Homophonic substitution – Vignere – Beauford and DES Family – Product ciphers – Lucifer and DES.

Unit-4

Asymmetric (Public) Key Cryptographic Systems

Concept of PKCS, RSA Cryptosystem- Variants of RSA – Primality testing – Security of RSA – Merkle – Hellamn – Security of Merkle – Hellaman, ElGamal. Elliptical Curve Cryptography.

Unit-3

Stream ciphers and block ciphers

The one time pad – Synchronous stream ciphers – Self-synchronizing stream ciphers – Feedback shift registers – Linear Complexity – Non-linear feedback shift registers – Stream ciphers based LFSRs. Non-linear Combination generators – Non linear filter generators – Clock controlled generators – The alternating step generators – The shrinking generators.

Unit-4

Digital Signatures

Properties, Generic signature schemes – Rabin Lamport – Matyasmeyer, RSA – Multiple RSA and ElGamal Signatures – Digital signature standard – Blind Signatures- RSA Blind.

Unit-5

Secret Sharing Algorithms

Threshold secret sharing – Shamir scheme, Blakley scheme and modular Scheme. Pseudo random number generators: Definition of randomness and pseudo-randomness – Statistical tests of randomness – Linear congruential generator – Modern PRNGs (a brief description).

Practicals

Reference Books

  • Padmanabhan T R, Shyamala C and Harini N, “Cryptography and Security”, Wiley Publications 2011.

  • Josef Pieprzyk, Thomas Hardjono and Jenifer Seberry, “Fundamentals of Computer Security”, Springer 2010.