0% found this document useful (0 votes)
5 views5 pages

PES Institute of Technology and Management: Lesson Schedule

Uploaded by

Damini T K
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views5 pages

PES Institute of Technology and Management: Lesson Schedule

Uploaded by

Damini T K
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

PES Institute of Technology and Management

Issue/ Rev. No: 3.4/R0 Page: 1 of 5


Date: 15/12/2016 Form No: R/PP-03/TLIA-07

Lesson Schedule

Department: Information Science and Engineering Date:29/09/2021


Name of Faculty: Mr. Venkatesh.P
Title of the subject: Cryptography Sub Code:18CS744 No. of hours:50

Lecture Module Topics to be covered Specify mode of Remarks


No. No. Date Date of Content delivery
Scheduled Delivery (Blackboard, PPT,
Video, others)
1 Prime, Co prime numbers and modular arithmetic 01/10/2021
2 1 Classical Encryption Techniques Symmetric 05/10/2021
Cipher Models
3 Cryptography, Cryptanalysis 07/10/2021
and Brute-Force Attack,
4 Substitution Techniques, Caesar Cipher, Mono 08/10/2021
alphabetic Cipher,
5 Play fair Cipher, Hill Cipher, 09/10/2021
6 Poly alphabetic Cipher, One Time Pad 12/10/2021
7 Traditional block Cipher structure, stream Ciphers 16/10/2021
8 Block Ciphers, Motivation for the feistel Cipher 19/10/2021
structure. The feistel Cipher, The data encryption
standard
PES Institute of Technology and Management
Issue/ Rev. No: 3.4/R0 Page: 2 of 5
Date: 15/12/2016 Form No: R/PP-03/TLIA-07

9 DES encryption, DES decryption ,A DES example, 21/10/2021


results, the avalanche effect,
10 The strength of DES, the use of 56-Bit Keys, the 22/10/2021
nature of the DES algorithm, timing
attacks, Block cipher design principles
11 Public-Key Cryptography and RSA: Principles of 23/10/2021
public-key cryptosystems. Public-key
cryptosystems
12 Applications for public-key cryptosystems, 26/10/2021
13 Requirements for public-key 28/10/2021
cryptosystems
14 Public-key cryptanalysis 29/10/2021
2
15 The RSA algorithm, description of the algorithm 30/10/2021
16 Computational aspects, the security of RSA 06/11/2021
17 Other Public-Key Cryptosystems: Diffie-hellman 09/11/2021
key exchange
18 The algorithm, key exchange protocols 11/11/2021
19 Man in the middle attack 12/11/2021
20 Elgamal Cryptographic systems 13/11/2021
21 3 Elliptic curve arithmetic, abelian groups, elliptic 18/11/2021
curves over real numbers,
22 Elliptic curves over Zp, elliptic curves 19/11/2021
overGF(2m), Elliptic curve cryptography
23 Analog of Diffie-hellman key exchange, Elliptic 20/11/2021
curve encryption/ decryption, security of Elliptic
curve cryptography
PES Institute of Technology and Management
Issue/ Rev. No: 3.4/R0 Page: 3 of 5
Date: 15/12/2016 Form No: R/PP-03/TLIA-07

24 Pseudorandom number generation based on an 23/11/2021


asymmetric cipher, PRNG based on RSA.
25 Key Management and Distribution: Symmetric key 25/11/2021
distribution using Symmetric encryption, A key
distribution scenario
26 Hierarchical key control, session key lifetime, a 26/11/2021
transparent key control scheme, Decentralized
key control, controlling key usage,
27 Symmetric key distribution using asymmetric 27/11/2021
encryption, simple secret key distribution
28 Secret key distribution with confidentiality and 30/11/2021
authentication, A hybrid scheme
29 Distribution of public keys, public announcement 02/12/2021
of public keys
30 Publicly available directory, public key 03/12/2021
authority, public keys certificates
31 X-509 certificates. Certificates, X-509 version 3, 04/12/2021
public key infrastructure.
32 Remote user Authentication principles, Mutual 07/12/2021
Authentication, one Way Authentication, remote
user Authentication using Symmetric encryption
33 Mutual Authentication, one way Authentication, 09/12/2021
4 Kerberos
34 Motivation , Kerberos version 4, 10/12/2021
Kerberos version 5
35 Remote user Authentication using Asymmetric 11/12/2021
PES Institute of Technology and Management
Issue/ Rev. No: 3.4/R0 Page: 4 of 5
Date: 15/12/2016 Form No: R/PP-03/TLIA-07

encryption, Mutual Authentication, one way


Authentication.
36 Electronic Mail Security: Pretty good privacy, 14/12/2021
notation, operational; description, S/MIME,
RFC5322,
37 Multipurpose internet mail 16/12/2021
extensions, S/MIME functionality
38 S/MIME messages, S/MIME certificate processing, 17/12/2021
39 Enhanced security services, Domain keys 18/12/2021
identified mail, internet mail architecture
40 E-Mail threats, DKIM strategy, DKIM functional 21/12/2021
flow
41 5 IP Security: IP Security overview, applications of 28/12/2021
IPsec, benefits of IPsec,
42 Routing applications, IPsec documents, IPsec 30/12/2021
services, transport and tunnel modes
43 IP Security policy, 31/12/2021
Security associations,
44 Security associations database, Security policy 01/01/2022
database, IP traffic processing
45 Encapsulating Security payload, ESP format 04/01/2022
46 Encryption and authentication algorithms, 06/01/2022
Padding, Anti replay service
47 Transport and tunnel modes, combining security 07/01/2022
associations, authentication plus confidentiality
48 Basic combinations of security associations, 08/01/2022
PES Institute of Technology and Management
Issue/ Rev. No: 3.4/R0 Page: 5 of 5
Date: 15/12/2016 Form No: R/PP-03/TLIA-07

internet key exchange


49 Key determinations protocol 11/01/2022
50 Header and payload formats, cryptographic suits. 13/01/2022
51 Revision 15/01/2022
52 Revision 18/01/2022
53 Revision 20/01/2022

Text Books:
1. William Stallings: Cryptography and Network Security, Pearson 6th edition

Reference Books:
1. V K Pachghare: Cryptography and Information Security, PHI 2 Edition.
nd

Signature of the Faculty

Signature of the HOD Signature of the Principal

You might also like