Syllabus
Introduction to number theory – Symmetric key and Public key crypto systems which includes pseudorandom functions and permutations, block ciphers, symmetric encryption schemes, security of symmetric encryption schemes, hash functions, message authentication codes (MACs), security of MACs, PKI, public‐key(asymmetric) encryption, digital signatures, security of asymmetric encryption and digital signature scheme. Chaos base cryptography systems – quantum computing – introduction to smartcard technology.
Text Books
Same as Reference
References
- William Stallings, “Cryptography And Network Security – Principles and Practices”, Pearson Education, Third Edition, 2003.
- Behrouz A. Foruzan, “Cryptography and Network Security”, Tata McGraw‐Hill, 2007
- Bruce Schneier, “Applied Cryptography”, John Wiley & Sons Inc, 2001.
- Wade Trappe and Lawrence C. Washington , “ Introduction to Cryptography with coding theory” , Pearson Education, 2007.
- Wenbo Mao, “ Modern Cryptography Theory and Practice” , Pearson Education, 2007.
- Thomas Calabrese, “Information Security Intelligence: Cryptographic Principles and Applications”, Thomson Delmar Learning,2006.