Download Crypto18CS744 Module3 Cryptography VTU Notes 7th Semester pdf, Download Module3 Crypto 18CS744 Cryptography 7th Semester VTU Notes Pdf
Crypto(Cryptography) (Effective from the academic year 2018 2019) SEMESTER – 7th 

Course Code  18CS744  CIE Marks  40  
Number of Contact Hours/Week  2:2:0  SEE Marks  60  
Total Number of Contact Hours  08  Exam Hours  03

Module3
Elliptic curve arithmetic
Elliptic curve arithmetic, abelian groups, elliptic curves over real numbers, elliptic curves over Zp, elliptic curves overGF(2m), Elliptic curve cryptography, Analog of Diffiehellman key exchange, Elliptic curve encryption/ decryption, security of Elliptic curve cryptography, Pseudorandom number generation based on an asymmetric cipher, PRNG based on RSA.
Key Management and Distribution:
Symmetric key distribution using Symmetric encryption, A key distribution scenario, Hierarchical key control, session key lifetime, a transparent key control scheme, Decentralized key control, controlling key usage, Symmetric key distribution using asymmetric encryption, simple secret key distribution, secret key distribution with confidentiality and authentication, A hybrid scheme, distribution of public keys, public announcement of public keys, publicly available directory,public key authority, public keys certificates.
Textbook 1: Ch. 10.310.5, Ch.14.1 to 14.3
RBT: L1, L2
Course outcomes:
The students should be able to:
 Define cryptography and its principles
 Explain Cryptography algorithms
 Illustrate Public and Private key cryptography
 Explain Key management, distribution and ceritification
 Explain authentication protocols
 Tell about IPSec
Question paper pattern:
 The question paper will have ten questions.
 There will be 2 questions from each module.
 Each question will have questions covering all the topics under a module.
 The students will have to answer 5 full questions, selecting one full question from each module.
Text Books:
1. William Stallings: Cryptography and Network Security, Pearson 6th edition.
Reference Books:
1. V K Pachghare: Cryptography and Information Security, PHI 2nd Edition