Course: IT348 CRYPTOGRAPHY & NETWORK SECURITY

Online Free Course:

https://www.udacity.com/course/applied-cryptography--cs387

Books:

Book 1: Cryptography and Network Security by William Stalling (7th Edition)

https://drive.google.com/open?id=1U63NFtA-eecJpIoR7FkZ83MBYJgseIcx&authuser=12drce005%40charusat.edu.in&usp=drive_fs

Book 2: Understanding Cryptography by Christof Paar

https://drive.google.com/open?id=1033ao02983Yor0xUF0fGI9Y0OZNfNC2i&authuser=12drce005%40charusat.edu.in&usp=drive_fs

Book 3: Behrouz A. Forouzan, Cryptography and Network Security, McGraw-Hill Companies

https://www.mhhe.com/engcs/compsci/forouzan/

Unit 1. Introduction and Mathematical Foundations

1.1 Security trends – Attacks, Services and Mechanism Page No. 27 to 34 (Book 1)

Video Lecture:

https://www.youtube.com/watch?v=2aHkqB2-46k (Introduction to Cryptography)

1.2 Conventional Encryption Model, Classical Encryption Techniques, Different types of ciphers,

Steganography Page No. 85 to 112 (Book 1)

Lecture Notes:

https://drive.google.com/file/d/1s4HoUX5ZKlKXOcqQsuzFmV16yjZdgQl2/view?usp=sharing

https://drive.google.com/file/d/13Aa6lOTxl8z0p9bfaAv2q7wlyBoeZSgb/view?usp=sharing

https://drive.google.com/file/d/1DnHO8x8N9yk_9hGcc9R5uhfuGJEBkvk5/view?usp=sharing

1.3 Basic Number Theory—Prime Page No. 61 to 64 (Book 1)

Relative Prime Numbers Page No. 17 (Book 2),

Modular Arithmetic Page No. 13 (Book 2),

Congruence Page No. 53 (Book 1),

Fermat and Euler’s theorem Page No. 166 to 168 (Book 2),

Euclid’s Algorithm Page No. 157 to 163 (Book 2),

Chinese Remainder Theorem Page No. 184 to 187 (Book 2),

LFSR sequences Page No. 41 to 44 (Book 2),

Finite fields Page No. 90 to 93 (Book 2).

Video Lecture:

https://www.youtube.com/watch?v=W1SY6qKZrUk (Modular Arithmetic and Historical

Ciphers)

https://www.youtube.com/watch?v=fq6SXByItUI (Number Theory for PKC: Euclidean

Algorithm, Euler's Phi Function & Euler's Theorem)

Lecture Notes:

https://drive.google.com/file/d/1DnHO8x8N9yk_9hGcc9R5uhfuGJEBkvk5/view?usp=sharing

Unit 2. Symmetric Key Ciphers

2.1 Simplified Data Encryption Standard, DES, Triple DES Page No. 61 to 80

Video Lecture:

https://www.youtube.com/watch?v=kPBJIhpcZgE (Data Encryption Standard

(DES): Encryption)

https://www.youtube.com/watch?v=l-7YW06BFNs (Data Encryption Standard (DES): Key

Schedule and Decryption)

Lecture Notes:

https://drive.google.com/file/d/1Wwwc3CfxIsVk_z5iBzQRj5g4H5giMhXA/view?usp=sharing

2.2 Differential and Linear Cryptanalysis Page No. 75 (Book 2),

Block Cipher Design Principles Page No. 135 to 137 (Book 1)

2.3 Advanced Encryption Standard Algorithm Pg No. 87 to 116 (Book 2)

Video Lecture:

https://www.youtube.com/watch?v=x1v2tX4_dkQ (Introduction to Galois Fields for the

AES)

Lecture Notes:

https://drive.google.com/file/d/1mFutsSt9CX4JKXSdg8zwDCfomCP6UF0I/view?usp=sharing

RC4 Page No. 269 to 271 (Book 1)

2.4 Modes of Operation Page No. 123 to 135 (Book 2)

https://www.youtube.com/watch?v=4FBgb2uobWI (Modes of Operation for Block Ciphers)

2.5 Pseudorandom Number generator and function Page No. 252 to 261 (Book 1)

Video Lecture:

https://www.youtube.com/watch?v=AELVJL0axRs (Stream Ciphers, Random Numbers and

the One Time Pad)

https://www.youtube.com/watch?v=sKUhFpVxNWc (Stream Ciphers and Linear Feedback

Shift Registers)

Lecture Notes:

https://drive.google.com/file/d/11P8d_I6-M4-zdh7dZRG7z-Ba_IRMl0QK/view?usp=sharing

Unit 3. Public Key Cryptography

3.1 RSA Algorithm Page No. 172 to 198 (Book 2)

Video Lecture:

https://www.youtube.com/watch?v=QSlWzKNbKrU (The RSA Cryptosystem and Efficient

Exponentiation)

Lecture Notes:

https://drive.google.com/file/d/1XBGu36x-wjjeqz4lyMUYJiZUrUJ5ETYI/view?usp=sharing

https://drive.google.com/file/d/1sjzUg2cvqZR_ubtLrTFl9aGn0kBJV-5y/view?usp=sharing

https://drive.google.com/file/d/1U-KwUf5qR_f_mkKV1jSkB0bko3CiZxdF/view?usp=sharing

3.2 Key Management Page No. 331 to 342 (Book 2)

3.3 ElGamal Algorithm Page No. 208 to 232 Page No. 342 to 344 (Book 2)

Video Lecture:

https://www.youtube.com/watch?v=IGqrbM52wtg (The Generalized Discrete Log Problem

and the Security of Diffie-Hellman)

https://www.youtube.com/watch?v=AQXRX55hgHs (Elgamal Digital Signature)

3.4 Diffie-Hellman Key Exchange Page No. 206 to 208 (Book 2)

Video Lecture:

https://www.youtube.com/watch?v=aeOzBCbwxUo (Diffie-Hellman Key Exchange and the

Discrete Log Problem)

https://www.youtube.com/watch?v=B9UirR9YDnQ (Man-in-the-middle Attack, Certificates

and PKI)

Lecture Notes:

https://drive.google.com/file/d/1o9xvHgEBnln1lMo2u4VGD2U75b8wAuzK/view?usp=sharing

Unit 4. Message Authentication and Hash Function

4.1 Authentication Requirement Page No. 382 to 383 (Book 1)

4.2 Hash Functions Page No. 293 to 303 (Book 2),

Security of Hash Functions Page No. 348 to 353 (Book 1)

MAC Page No. 319 to 321 (Book 2)

Video Lecture:

https://www.youtube.com/watch?v=tLkHk__-M6Q&t=1s (Hash Functions)

4.3 MD5 Message Digest Algorithm Page No. 303 to 307 (Book 2),

Secure Hash Algorithm Page No. 307 to 312 (Book 2),

Page No. 321 to 325 (Book 2)

Video Lecture:

https://www.youtube.com/watch?v=JIhZWgJA-9o (SHA-1 Hash Function)

https://www.youtube.com/watch?v=JWskjzgiIa4&t=2s (SHA-3 Hash Function)

https://www.youtube.com/watch?v=DiLPn_ldAAQ&t=62s (MAC (Message Authentication

Codes) and HMAC)

4.4 Authentication protocols,

Digital Signatures, DSS Page No. 259 to 282 (Book 2)

Video Lecture:

https://www.youtube.com/watch?v=jbBe4AS5pk0 (Digital Signatures and Security Services)

Lecture Notes:

https://drive.google.com/file/d/1OJl7S0GrQQ9KSKelpOENze_Rudkb4wbu/view?usp=sharing

Unit 5. Network Security

5.1 Authentication Applications - Kerberos Page No. 339 to 341 (Book 2)

Video Lecture:

https://www.youtube.com/watch?v=iaH8UG2yMg4 (Symmetric Key Establishment and

Kerberos)

X.509 Page No. 344 to 351 (Book 2),

5.2 Electronic Mail Security—PGP, S/MIME

https://learning.oreilly.com/library/view/wireless-mobile-internet/9781118512944/9781118512944c10.xhtml

Lecture Notes:

https://drive.google.com/file/d/1N_nvXxIelQ82-1IS3ZkCcwUzCzK7HLef/view?usp=sharing

5.3 IP security - Overview, ESP, AH, Transport and Tunnel mode in IP Sec

https://learning.oreilly.com/library/view/wireless-mobile-internet/9781118512944/9781118512944c08.xhtml#c08_level1_2

5.4 Web Security - Web Security Requirement, SSL, TLS

https://learning.oreilly.com/library/view/wireless-mobile-internet/9781118512944/9781118512944c09.xhtml

Lecture Notes:

https://drive.google.com/file/d/1YGvXwYpeL7QKnMV0pUSXNYZSIkuwXpCA/view?usp=sharing

SET for E-Commerce Transaction

https://learning.oreilly.com/library/view/wireless-mobile-internet/9781118512944/9781118512944c12.xhtml

Unit 6. System Security

6.1 Intruders, Viruses and Related Threats

6.2 Firewall Design Principles

https://learning.oreilly.com/library/view/wireless-mobile-internet/9781118512944/9781118512944c11.xhtml