PES Institute of Technology and Management
Issue/ Rev. No: 3.4/R0 Page: 1 of 5
Date: 15/12/2016 Form No: R/PP-03/TLIA-07
Lesson Schedule
Department: Information Science and Engineering Date:29/09/2021
Name of Faculty: Mr. Venkatesh.P
Title of the subject: Cryptography Sub Code:18CS744 No. of hours:50
Lecture Module Topics to be covered Specify mode of Remarks
No. No. Date Date of Content delivery
Scheduled Delivery (Blackboard, PPT,
Video, others)
1 Prime, Co prime numbers and modular arithmetic 01/10/2021
2 1 Classical Encryption Techniques Symmetric 05/10/2021
Cipher Models
3 Cryptography, Cryptanalysis 07/10/2021
and Brute-Force Attack,
4 Substitution Techniques, Caesar Cipher, Mono 08/10/2021
alphabetic Cipher,
5 Play fair Cipher, Hill Cipher, 09/10/2021
6 Poly alphabetic Cipher, One Time Pad 12/10/2021
7 Traditional block Cipher structure, stream Ciphers 16/10/2021
8 Block Ciphers, Motivation for the feistel Cipher 19/10/2021
structure. The feistel Cipher, The data encryption
standard
PES Institute of Technology and Management
Issue/ Rev. No: 3.4/R0 Page: 2 of 5
Date: 15/12/2016 Form No: R/PP-03/TLIA-07
9 DES encryption, DES decryption ,A DES example, 21/10/2021
results, the avalanche effect,
10 The strength of DES, the use of 56-Bit Keys, the 22/10/2021
nature of the DES algorithm, timing
attacks, Block cipher design principles
11 Public-Key Cryptography and RSA: Principles of 23/10/2021
public-key cryptosystems. Public-key
cryptosystems
12 Applications for public-key cryptosystems, 26/10/2021
13 Requirements for public-key 28/10/2021
cryptosystems
14 Public-key cryptanalysis 29/10/2021
2
15 The RSA algorithm, description of the algorithm 30/10/2021
16 Computational aspects, the security of RSA 06/11/2021
17 Other Public-Key Cryptosystems: Diffie-hellman 09/11/2021
key exchange
18 The algorithm, key exchange protocols 11/11/2021
19 Man in the middle attack 12/11/2021
20 Elgamal Cryptographic systems 13/11/2021
21 3 Elliptic curve arithmetic, abelian groups, elliptic 18/11/2021
curves over real numbers,
22 Elliptic curves over Zp, elliptic curves 19/11/2021
overGF(2m), Elliptic curve cryptography
23 Analog of Diffie-hellman key exchange, Elliptic 20/11/2021
curve encryption/ decryption, security of Elliptic
curve cryptography
PES Institute of Technology and Management
Issue/ Rev. No: 3.4/R0 Page: 3 of 5
Date: 15/12/2016 Form No: R/PP-03/TLIA-07
24 Pseudorandom number generation based on an 23/11/2021
asymmetric cipher, PRNG based on RSA.
25 Key Management and Distribution: Symmetric key 25/11/2021
distribution using Symmetric encryption, A key
distribution scenario
26 Hierarchical key control, session key lifetime, a 26/11/2021
transparent key control scheme, Decentralized
key control, controlling key usage,
27 Symmetric key distribution using asymmetric 27/11/2021
encryption, simple secret key distribution
28 Secret key distribution with confidentiality and 30/11/2021
authentication, A hybrid scheme
29 Distribution of public keys, public announcement 02/12/2021
of public keys
30 Publicly available directory, public key 03/12/2021
authority, public keys certificates
31 X-509 certificates. Certificates, X-509 version 3, 04/12/2021
public key infrastructure.
32 Remote user Authentication principles, Mutual 07/12/2021
Authentication, one Way Authentication, remote
user Authentication using Symmetric encryption
33 Mutual Authentication, one way Authentication, 09/12/2021
4 Kerberos
34 Motivation , Kerberos version 4, 10/12/2021
Kerberos version 5
35 Remote user Authentication using Asymmetric 11/12/2021
PES Institute of Technology and Management
Issue/ Rev. No: 3.4/R0 Page: 4 of 5
Date: 15/12/2016 Form No: R/PP-03/TLIA-07
encryption, Mutual Authentication, one way
Authentication.
36 Electronic Mail Security: Pretty good privacy, 14/12/2021
notation, operational; description, S/MIME,
RFC5322,
37 Multipurpose internet mail 16/12/2021
extensions, S/MIME functionality
38 S/MIME messages, S/MIME certificate processing, 17/12/2021
39 Enhanced security services, Domain keys 18/12/2021
identified mail, internet mail architecture
40 E-Mail threats, DKIM strategy, DKIM functional 21/12/2021
flow
41 5 IP Security: IP Security overview, applications of 28/12/2021
IPsec, benefits of IPsec,
42 Routing applications, IPsec documents, IPsec 30/12/2021
services, transport and tunnel modes
43 IP Security policy, 31/12/2021
Security associations,
44 Security associations database, Security policy 01/01/2022
database, IP traffic processing
45 Encapsulating Security payload, ESP format 04/01/2022
46 Encryption and authentication algorithms, 06/01/2022
Padding, Anti replay service
47 Transport and tunnel modes, combining security 07/01/2022
associations, authentication plus confidentiality
48 Basic combinations of security associations, 08/01/2022
PES Institute of Technology and Management
Issue/ Rev. No: 3.4/R0 Page: 5 of 5
Date: 15/12/2016 Form No: R/PP-03/TLIA-07
internet key exchange
49 Key determinations protocol 11/01/2022
50 Header and payload formats, cryptographic suits. 13/01/2022
51 Revision 15/01/2022
52 Revision 18/01/2022
53 Revision 20/01/2022
Text Books:
1. William Stallings: Cryptography and Network Security, Pearson 6th edition
Reference Books:
1. V K Pachghare: Cryptography and Information Security, PHI 2 Edition.
nd
Signature of the Faculty
Signature of the HOD Signature of the Principal