Download Crypto18CS744 Module-3 Cryptography VTU Notes 7th Semester pdf

Download Crypto18CS744 Module-3 Cryptography VTU Notes 7th Semester pdf, Download Module-3 Crypto 18CS744 Cryptography 7th Semester VTU Notes Pdf

(Effective from the academic year 2018 -2019)
Course Code 18CS744 CIE Marks 40
Number of Contact Hours/Week 2:2:0 SEE Marks 60
Total Number of Contact Hours 08 Exam Hours 03


Elliptic curve arithmetic
Elliptic curve arithmetic, abelian groups, elliptic curves over real numbers, elliptic curves over Zp, elliptic curves overGF(2m), Elliptic curve cryptography, Analog of Diffie-hellman key exchange, Elliptic curve encryption/ decryption, security of Elliptic curve cryptography, Pseudorandom number generation based on an asymmetric cipher, PRNG based on RSA.

Key Management and Distribution:

Symmetric key distribution using Symmetric encryption, A key distribution scenario, Hierarchical key control, session key lifetime, a transparent key control scheme, Decentralized key control, controlling key usage, Symmetric key distribution using asymmetric encryption, simple secret key distribution, secret key distribution with confidentiality and authentication, A hybrid scheme, distribution of public keys, public announcement of public keys, publicly available directory,public key authority, public keys certificates.

Textbook 1: Ch. 10.3-10.5, Ch.14.1 to 14.3

RBT: L1, L2

Course outcomes:

The students should be able to:

  • Define cryptography and its principles
  • Explain Cryptography algorithms
  • Illustrate Public and Private key cryptography
  • Explain Key management, distribution and ceritification
  • Explain authentication protocols
  • Tell about IPSec

Question paper pattern:

  • The question paper will have ten questions.
  • There will be 2 questions from each module.
  • Each question will have questions covering all the topics under a module.
  • The students will have to answer 5 full questions, selecting one full question from each module.

Text Books:

1. William Stallings: Cryptography and Network Security, Pearson 6th edition.

Reference Books:

1. V K Pachghare: Cryptography and Information Security, PHI 2nd Edition

Leave a Comment