Outline: With the rapid growth of digital communication and electronic data exchange, information security becomes a crucial problem in the industries, business, and administration. Data exchanged over the public networks (Internet) must be kept confidential and protected against manipulations. Electronic business requires digital signatures that are valid in law, and secure payment-protocols. Coming to the 4th industrial technology revolution, digital assets become more valuable and people will look into blockchain more. Modern days cryptography is ubiquitous and plays a key role in providing solutions for data privacy and integrity.
Objectives: In this course, students will learn security issues of communications, classical cryptographic algorithms, symmetric-key cryptography, public-key cryptography, digital signatures, and the real-life applications. At the end of this course, students will know how to apply cryptographic techniques in the design and analysis of secure distributed systems.
Course Outline (Topics): The following list of topics is tentative. Based on available time slots, some topics may be dropped or added or reordered.
Module-I: Number Theory Basics - Modular arithmetic, Primes, Euclidean Algorithm, Chinese Remainder Theorem.
Module-II: Shannon’s Theory - Perfect Secrecy, Entropy, Security analysis of Classical ciphers.
Module-III: Symmetric Key Cryptography - DES, Finite Fields, AES, Security Analysis.
Module-IV: Public Key Cryptography - RSA, ElGamal, Elliptic Curve Cryptography.
Module-V: Digital Signatures - Hash functions, Digital Signature Algorithm, ElGamal Digital Signature.
Module-VI: Applications - Key Distribution, Diffi-Helman Kay Exchange, Key Management in Distributed Systems.
Reference Textbook:
"Cryptography and Network Security", Behrouz A Forouzan, Debdeep Mukhopadhyay, McGraw-Hill Education, 2011.
"Cryptography: Theory and Practice", Douglas Stinson, Chapman and Hall/CRC, 3rd Edition, 2006.
"Cryptography and Network Security: Principles and Practice", William Stallings, 6th Edition, Pearson Education, 2014.
"A course in number theory and cryptography", Neal Koblitz, Second Edition, Springer.
"Handbook of Applied Cryptography", Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone, CRC Press.
"Blockchain Technology Overview", D. Yaga, P. Mell, N. Roby, and K. Scarfone, NISTIR 8202.
"Bitcoin: A peer-to-peer electronic cash system", Satoshi Nakamoto, Manubot, 2019.
Classroom Lecture Notes