Course: IT348 CRYPTOGRAPHY & NETWORK SECURITY
Online Free Course:
https://www.udacity.com/course/applied-cryptography--cs387
Books:
Book 1: Cryptography and Network Security by William Stalling (7th Edition)
https://drive.google.com/open?id=1U63NFtA-eecJpIoR7FkZ83MBYJgseIcx&authuser=12drce005%40charusat.edu.in&usp=drive_fs
Book 2: Understanding Cryptography by Christof Paar
Book 3: Behrouz A. Forouzan, Cryptography and Network Security, McGraw-Hill Companies
https://www.mhhe.com/engcs/compsci/forouzan/
Unit 1. Introduction and Mathematical Foundations
1.1 Security trends – Attacks, Services and Mechanism Page No. 27 to 34 (Book 1)
Video Lecture:
https://www.youtube.com/watch?v=2aHkqB2-46k (Introduction to Cryptography)
1.2 Conventional Encryption Model, Classical Encryption Techniques, Different types of ciphers,
Steganography Page No. 85 to 112 (Book 1)
Lecture Notes:
https://drive.google.com/file/d/1s4HoUX5ZKlKXOcqQsuzFmV16yjZdgQl2/view?usp=sharing
https://drive.google.com/file/d/13Aa6lOTxl8z0p9bfaAv2q7wlyBoeZSgb/view?usp=sharing
https://drive.google.com/file/d/1DnHO8x8N9yk_9hGcc9R5uhfuGJEBkvk5/view?usp=sharing
1.3 Basic Number Theory—Prime Page No. 61 to 64 (Book 1)
Relative Prime Numbers Page No. 17 (Book 2),
Modular Arithmetic Page No. 13 (Book 2),
Congruence Page No. 53 (Book 1),
Fermat and Euler’s theorem Page No. 166 to 168 (Book 2),
Euclid’s Algorithm Page No. 157 to 163 (Book 2),
Chinese Remainder Theorem Page No. 184 to 187 (Book 2),
LFSR sequences Page No. 41 to 44 (Book 2),
Finite fields Page No. 90 to 93 (Book 2).
Video Lecture:
https://www.youtube.com/watch?v=W1SY6qKZrUk (Modular Arithmetic and Historical
Ciphers)
https://www.youtube.com/watch?v=fq6SXByItUI (Number Theory for PKC: Euclidean
Algorithm, Euler's Phi Function & Euler's Theorem)
Lecture Notes:
https://drive.google.com/file/d/1DnHO8x8N9yk_9hGcc9R5uhfuGJEBkvk5/view?usp=sharing
Unit 2. Symmetric Key Ciphers
2.1 Simplified Data Encryption Standard, DES, Triple DES Page No. 61 to 80
Video Lecture:
https://www.youtube.com/watch?v=kPBJIhpcZgE (Data Encryption Standard
(DES): Encryption)
https://www.youtube.com/watch?v=l-7YW06BFNs (Data Encryption Standard (DES): Key
Schedule and Decryption)
Lecture Notes:
https://drive.google.com/file/d/1Wwwc3CfxIsVk_z5iBzQRj5g4H5giMhXA/view?usp=sharing
2.2 Differential and Linear Cryptanalysis Page No. 75 (Book 2),
Block Cipher Design Principles Page No. 135 to 137 (Book 1)
2.3 Advanced Encryption Standard Algorithm Pg No. 87 to 116 (Book 2)
Video Lecture:
https://www.youtube.com/watch?v=x1v2tX4_dkQ (Introduction to Galois Fields for the
AES)
Lecture Notes:
https://drive.google.com/file/d/1mFutsSt9CX4JKXSdg8zwDCfomCP6UF0I/view?usp=sharing
RC4 Page No. 269 to 271 (Book 1)
2.4 Modes of Operation Page No. 123 to 135 (Book 2)
https://www.youtube.com/watch?v=4FBgb2uobWI (Modes of Operation for Block Ciphers)
2.5 Pseudorandom Number generator and function Page No. 252 to 261 (Book 1)
Video Lecture:
https://www.youtube.com/watch?v=AELVJL0axRs (Stream Ciphers, Random Numbers and
the One Time Pad)
https://www.youtube.com/watch?v=sKUhFpVxNWc (Stream Ciphers and Linear Feedback
Shift Registers)
Lecture Notes:
https://drive.google.com/file/d/11P8d_I6-M4-zdh7dZRG7z-Ba_IRMl0QK/view?usp=sharing
Unit 3. Public Key Cryptography
3.1 RSA Algorithm Page No. 172 to 198 (Book 2)
Video Lecture:
https://www.youtube.com/watch?v=QSlWzKNbKrU (The RSA Cryptosystem and Efficient
Exponentiation)
Lecture Notes:
https://drive.google.com/file/d/1XBGu36x-wjjeqz4lyMUYJiZUrUJ5ETYI/view?usp=sharing
https://drive.google.com/file/d/1sjzUg2cvqZR_ubtLrTFl9aGn0kBJV-5y/view?usp=sharing
https://drive.google.com/file/d/1U-KwUf5qR_f_mkKV1jSkB0bko3CiZxdF/view?usp=sharing
3.2 Key Management Page No. 331 to 342 (Book 2)
3.3 ElGamal Algorithm Page No. 208 to 232 Page No. 342 to 344 (Book 2)
Video Lecture:
https://www.youtube.com/watch?v=IGqrbM52wtg (The Generalized Discrete Log Problem
and the Security of Diffie-Hellman)
https://www.youtube.com/watch?v=AQXRX55hgHs (Elgamal Digital Signature)
3.4 Diffie-Hellman Key Exchange Page No. 206 to 208 (Book 2)
Video Lecture:
https://www.youtube.com/watch?v=aeOzBCbwxUo (Diffie-Hellman Key Exchange and the
Discrete Log Problem)
https://www.youtube.com/watch?v=B9UirR9YDnQ (Man-in-the-middle Attack, Certificates
and PKI)
Lecture Notes:
https://drive.google.com/file/d/1o9xvHgEBnln1lMo2u4VGD2U75b8wAuzK/view?usp=sharing
Unit 4. Message Authentication and Hash Function
4.1 Authentication Requirement Page No. 382 to 383 (Book 1)
4.2 Hash Functions Page No. 293 to 303 (Book 2),
Security of Hash Functions Page No. 348 to 353 (Book 1)
MAC Page No. 319 to 321 (Book 2)
Video Lecture:
https://www.youtube.com/watch?v=tLkHk__-M6Q&t=1s (Hash Functions)
4.3 MD5 Message Digest Algorithm Page No. 303 to 307 (Book 2),
Secure Hash Algorithm Page No. 307 to 312 (Book 2),
Page No. 321 to 325 (Book 2)
Video Lecture:
https://www.youtube.com/watch?v=JIhZWgJA-9o (SHA-1 Hash Function)
https://www.youtube.com/watch?v=JWskjzgiIa4&t=2s (SHA-3 Hash Function)
https://www.youtube.com/watch?v=DiLPn_ldAAQ&t=62s (MAC (Message Authentication
Codes) and HMAC)
4.4 Authentication protocols,
Digital Signatures, DSS Page No. 259 to 282 (Book 2)
Video Lecture:
https://www.youtube.com/watch?v=jbBe4AS5pk0 (Digital Signatures and Security Services)
Lecture Notes:
https://drive.google.com/file/d/1OJl7S0GrQQ9KSKelpOENze_Rudkb4wbu/view?usp=sharing
Unit 5. Network Security
5.1 Authentication Applications - Kerberos Page No. 339 to 341 (Book 2)
Video Lecture:
https://www.youtube.com/watch?v=iaH8UG2yMg4 (Symmetric Key Establishment and
Kerberos)
X.509 Page No. 344 to 351 (Book 2),
5.2 Electronic Mail Security—PGP, S/MIME
Lecture Notes:
https://drive.google.com/file/d/1N_nvXxIelQ82-1IS3ZkCcwUzCzK7HLef/view?usp=sharing
5.3 IP security - Overview, ESP, AH, Transport and Tunnel mode in IP Sec
5.4 Web Security - Web Security Requirement, SSL, TLS
Lecture Notes:
https://drive.google.com/file/d/1YGvXwYpeL7QKnMV0pUSXNYZSIkuwXpCA/view?usp=sharing
SET for E-Commerce Transaction
Unit 6. System Security
6.1 Intruders, Viruses and Related Threats
6.2 Firewall Design Principles