Cryptography and Information Security

sharaf's picture
Course Code: 
131391
Course Outline: 

 

Text Book

 

Title

Cryptography and Network Security Principles and Practices,

 

Author(s)

William Stallings

 

Publisher

Prentice Hall

 

Year

 2005

 

Edition

Fourth Edition

 

References

Handbook of Applied Cryptography, CRT Press 2001, available at: http://www.cacr.math.uwaterloo.ca/hac/

 

Course Objectives

  1. Presents the major security threats and the security architecture
  2.  Explain the encryption techniques and their different classes and explain the difference between different Encryption techniques and their different areas of application.
  3. Highlight the key distribution problem.
  4. Equip the students with basic theories in modular arithmetic and in the number theory to enable them to understand the mathematical model of modern encryption algorithms
  5. Introduce the modern encryption techniques.

Learning Outcomes

  • Know the aspects of information security, which includes security attacks, mechanism and services.
  • Show knew the OSI security architecture
  • Understand the model of computer and network security
  • Distinguish between computer and network security.
  • Understand cryptography terminologies and classes.
  • Understand classical encryption techniques and their applications
  • Understand the need for new conventional encryption techniques (CET)
  • Understand the principles of conventional encryption techniques (Fiestel and Simplified DES)
  • Understand the different modes of operations for CETs.
  • Be able to distinguish between different contemporary CETs.
  • Recognize the different potential locations for the placement of encryption functions
  • Understand the size of key distribution problem and all possible solution techniques
  • The importance of Random numbers in the solving the key distribution problem.
  • Understand the modular arithmetic and Euclid’s algorithm
  • Understand and be able to work with prime numbers, Euler’s theorems and Discrete Logarithms
  • Understand the principles of Public-Key Cryptography systems
  • Understand the RSA algorithm thoroughly and compare it against other existing asymmetric algorithms using Elliptic Curve Arithmetic.
  • Understand the key management in Public-Key Cryptosystems
  • Understand the idea of message authentication code (MAC) and Hash functions
  • Understand the message authentication codes and Hash functions
  • Understand the security and attacks of (MAC) and Hash functions.
  • Be able to analyze one of the Hash functions
  • Know how to use digital signature and authentication protocols in real life application problems (i.e, E-commerce).

 

 

 

 

Course Content

  • Course Introduction and overview
  • Classical encryption techniques
  • Simplified DES, Block Cipher Principles, the Data Encryption Standard.
  • The Strength of DES, Block Cipher Design Principles, Block Cipher Modes of Operation.
  • Advanced encryption standard.
  • Contemporary symmetric ciphers
  • Placement of encryption function, traffic confidentiality, Key Distribution.
  • Random Number Generation, Groups, Rings, and Fields, Modular Arithmetic.
  • Principles of Public-Key Cryptosystems, the RSA Algorithm, Elliptic Curve Cryptography.
  • Key Management, Elliptic Curve Arithmetic
  • Authentication Requirements, Authentication Functions, Message Authentication Codes.