Syllabus - Data Security (CY503 (C))
CSE-Cyber Security/Cyber Security
Data Security (CY503 (C))
V-Semester
Unit-1
Introduction
History of Cryptography. Mathematical background: Probability theory - theory. Symmetric (Private) Key theory, Number Information Cryptographic Systems: Caesar – Aff ine – Monoalphabetic Substitution – Transposition – Homophonic substitution – Vignere – Beauford and DES Family – Product ciphers – Lucifer and DES.
Unit-4
Asymmetric (Public) Key Cryptographic Systems
Concept of PKCS, RSA Cryptosystem- Variants of RSA – Primality testing – Security of RSA – Merkle – Hellamn – Security of Merkle – Hellaman, ElGamal. Elliptical Curve Cryptography.
Unit-3
Stream ciphers and block ciphers
The one time pad – Synchronous stream ciphers – Self-synchronizing stream ciphers – Feedback shift registers – Linear Complexity – Non-linear feedback shift registers – Stream ciphers based LFSRs. Non-linear Combination generators – Non linear filter generators – Clock controlled generators – The alternating step generators – The shrinking generators.
Unit-4
Digital Signatures
Properties, Generic signature schemes – Rabin Lamport – Matyasmeyer, RSA – Multiple RSA and ElGamal Signatures – Digital signature standard – Blind Signatures- RSA Blind.
Unit-5
Secret Sharing Algorithms
Threshold secret sharing – Shamir scheme, Blakley scheme and modular Scheme. Pseudo random number generators: Definition of randomness and pseudo-randomness – Statistical tests of randomness – Linear congruential generator – Modern PRNGs (a brief description).
Practicals
Reference Books
-
Padmanabhan T R, Shyamala C and Harini N, “Cryptography and Security”, Wiley Publications 2011.
-
Josef Pieprzyk, Thomas Hardjono and Jenifer Seberry, “Fundamentals of Computer Security”, Springer 2010.