Download Crypto18CS744 Module-3 Cryptography VTU Notes 7th Semester pdf, Download Module-3 Crypto 18CS744 Cryptography 7th Semester VTU Notes Pdf
Crypto(Cryptography) (Effective from the academic year 2018 -2019) SEMESTER – 7th |
||||
Course Code | 18CS744 | CIE Marks | 40 | |
Number of Contact Hours/Week | 2:2:0 | SEE Marks | 60 | |
Total Number of Contact Hours | 08 | Exam Hours | 03
|
Module-3
Elliptic curve arithmetic
Elliptic curve arithmetic, abelian groups, elliptic curves over real numbers, elliptic curves over Zp, elliptic curves overGF(2m), Elliptic curve cryptography, Analog of Diffie-hellman key exchange, Elliptic curve encryption/ decryption, security of Elliptic curve cryptography, Pseudorandom number generation based on an asymmetric cipher, PRNG based on RSA.
Key Management and Distribution:
Symmetric key distribution using Symmetric encryption, A key distribution scenario, Hierarchical key control, session key lifetime, a transparent key control scheme, Decentralized key control, controlling key usage, Symmetric key distribution using asymmetric encryption, simple secret key distribution, secret key distribution with confidentiality and authentication, A hybrid scheme, distribution of public keys, public announcement of public keys, publicly available directory,public key authority, public keys certificates.
Textbook 1: Ch. 10.3-10.5, Ch.14.1 to 14.3
RBT: L1, L2
Course outcomes:
The students should be able to:
- Define cryptography and its principles
- Explain Cryptography algorithms
- Illustrate Public and Private key cryptography
- Explain Key management, distribution and ceritification
- Explain authentication protocols
- Tell about IPSec
Question paper pattern:
- The question paper will have ten questions.
- There will be 2 questions from each module.
- Each question will have questions covering all the topics under a module.
- The students will have to answer 5 full questions, selecting one full question from each module.
Text Books:
1. William Stallings: Cryptography and Network Security, Pearson 6th edition.
Reference Books:
1. V K Pachghare: Cryptography and Information Security, PHI 2nd Edition