SUMMARY OF INFORMATION ON EACH COURSE

Similar documents
SUMMARY OF INFORMATION ON EACH COURSE

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

SRI VENKATESWARA COLLEGE OF ENGINEERING

Cryptography and Network Security

C - Cryptography

C - Cryptography

CRYPTOGRAPHY AND NETWORK SECURITY

Study Guide to Mideterm Exam

A & B Section. Day. A Mrs. Krishnaveni S 1204 UB

KALASALINGAM UNIVERSITY

For Tricia: never dull, never boring, the smartest and bravest person I know

Course Name: Information and Computers Networks Security Course Code: IT423

Topics. Number Theory Review. Public Key Cryptography

Cryptography. Dr. Michael Schneider October 10, 2017 h_da WS2017/18 Security Protocols Dr. Michael Schneider 1

KALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER COURSE PLAN

Faculty of Science & Information Technology

Introduction to Network Security Missouri S&T University CPE 5420 Data Encryption Standard

ECE 646 Fall 2009 Final Exam December 15, Multiple-choice test

Cryptography and Network Security

Academic Course Description

Name of chapter & details.

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

Cryptography MIS

A SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS

SE 4472a: Information Security

Computer Security: Principles and Practice

Syllabus CS 430 Introduction to Computer Security Winter 2016

Public Key Cryptography

Channel Coding and Cryptography Part II: Introduction to Cryptography

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 6 Introduction to Public-Key Cryptography

BCA III Network security and Cryptography Examination-2016 Model Paper 1

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

M.D UNIVERSITY SCHEME OF STUDIES AND EXAMINATION M.TECH 2nd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER 3rd CBCS Scheme effective from

Stream Ciphers and Block Ciphers

CSE 127: Computer Security Cryptography. Kirill Levchenko

Total No. of Questions : 09 ] [ Total No.of Pages : 02

2. SCQF level: Choose 3. SCQF credit value ECTS credit value: 10

Modes of Operation. Raj Jain. Washington University in St. Louis

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 6 Introduction to Public-Key Cryptography

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

L13. Reviews. Rocky K. C. Chang, April 10, 2015

Introduction to information Security

City University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester B 2017/18

Network Security. Chapter 4 Public Key Cryptography. Public Key Cryptography (4) Public Key Cryptography

Public Key Algorithms

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

SECURITY MANAGEMENT SYSTEM FUNCTIONAL ARCHITECTURE FOR ENTERPRISE NETWORK

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

Study and Analysis of Symmetric Key-Cryptograph DES, Data Encryption Standard

HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING

Chapter 3 Public Key Cryptography

Diffie-Hellman Protocol as a Symmetric Cryptosystem

ECE 297:11 Reconfigurable Architectures for Computer Security

Homework 2. Out: 09/23/16 Due: 09/30/16 11:59pm UNIVERSITY OF MARYLAND DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING

Basics of Cryptography

CS669 Network Security

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus

Symmetric, Asymmetric, and One Way Technologies

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Intel R Integrated Performance Primitives. Cryptography Guide. Andrzej Chrzȩszczyk Jakub Chrzȩszczyk

Analysis, demands, and properties of pseudorandom number generators

NIST Cryptographic Toolkit

Cipher Suite Configuration Mode Commands

10EC832: NETWORK SECURITY

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Lecture 6: Overview of Public-Key Cryptography and RSA

Authentication Part IV NOTE: Part IV includes all of Part III!

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

ECE 646 Cryptography and Computer Network Security. Kris Gaj Research and teaching interests:

FOURIER MASKING ENCRYPTION ALGORITHM FOR POLYALPHABETIC SYMMETRIC KEY CRYPTOGRAPHY

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl

B. Subject-specific skills B1. Problem solving skills: Supply the student with the ability to solve different problems related to the topics

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7

This chapter continues our overview of public-key cryptography systems (PKCSs), and begins with a description of one of the earliest and simplest

Justification: IT/COMP 421 is now IT421. Adjustments made so both CS and IT majors have equivalent prereqs. Corrects error in course justification.

Netzwerksicherheit [NetSec]

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

A SIMPLIFIED IDEA ALGORITHM

Foreword Preface About the Author Aperitifs The Lexicon of Cryptography Cryptographic Systems Cryptanalysis Side Information Thomas Jefferson and the

UNCLASSIFIED INFORMATION TECHNOLOGY SECURITY GUIDANCE

T Cryptography and Data Security

Jaap van Ginkel Security of Systems and Networks

Public Key Cryptography

Public Key Encryption. Modified by: Dr. Ramzi Saifan

ECE 646 Fall 2015 Term Project. Overview, comparison of open crypto libraries for application development. By Ravi Kota

Information Security: Principles and Practice Second Edition. Mark Stamp

Journal of Computer Engineering & Technology (JCET) ISSN (Print), ISSN (Online), Volume 1, Issue 1, July-December (2013)

Lecture 2 Applied Cryptography (Part 2)

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements

The most important development from the work on public-key cryptography is the digital signature. Message authentication protects two parties who

New Scheme for Integrated M. Sc. (5 years) Programme (Computer Science) starting from 2013

Cryptography 1. Hans-Wolfgang Loidl School of Mathematical and Computer Sciences Heriot-Watt University, Edinburgh

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security

Netzwerksicherheit [NetSec] Systemsicherheit [SysSec]

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

CPS2323. Block Ciphers: The Data Encryption Standard (DES)

CSC 774 Network Security

Lecture 4: Symmetric Key Encryption

T Cryptography and Data Security

Transcription:

1. Name of Course Applied Cryptography 2. Course Code TAC 3121 3. Status of Course Specialisation Core for B.IT Security Technology [Applies to (cohort) ] 4. MQF Level/Stage Note : Certificate MQF Level 3 Diploma MQF Level 4 Bachelor MQF Level 6 Masters MQF Level 7 Doctoral MQF Level 8 5. Version (State the date of the Senate approval history of previous and current approval date) 6. Pre-Requisite Bachelor Degree MQF Level 6 Date of previous version: Date of current version: June 2012 June 2014 TDS2111 Data Structures and Algorithms 7. Name(s) of academic/teaching staff Jaya Kumar Krishnan Tan Syh Yuan Low Cheng Yaw 8. Semester and Year offered Trimester 1, Year 3 9. Objective of the course in the programme : To introduce the students to the definitions and constructions of various cryptosystems, and the underlying security issues. 10. Justification for including the course in the programme : The knowledge is important for Security Technology students because cryptography is the theoretical basis of computer and network security. This course covers the basic of cryptography; the basic of computational number theory; the constructions and security issues of various cryptosystems, such as symmetric encryption schemes (stream cipher and block cipher), message authentication codes and hash functions, asymmetric encryption schemes and digital signature schemes. 11. Course Learning Outcomes : Domain Level LO1: Recall the definitions of all the concepts and technical Cognitive 1 terms related to fundamental concepts of cryptography. LO2: Apply fundamental of cryptanalysis concepts in cryptographic applications. Cognitive 3 LO3: Appraise different security Cognitive 6 Ver.1, Rev.2 Page1 of 6

level of various cryptosystems between the various cryptographic schemes. LO4: Analyse and assess the various cryptosystems and applications. Affective 4 LO5: Implement some simple cryptographic schemes. Cognitive 3 12. Mapping of Learning Outcomes to Programme Outcomes : Learning Outcomes PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 LO1 X LO2 X LO3 X LO4 X X X LO5 X X X 13. Assessment Methods and Types : Method and Type Description/Details Percentage Test Quiz Written Test Written Quiz 20% 5% Assignment Report & Presentation 15% Final Exam Written Exam 60% 14. Mapping of assessment components to learning outcomes (LOs) Assessment Components LO1 LO2 LO3 LO4 LO5 Test 23.53 23.53 23.53 Quiz 5.88 5.88 5.88 Assignment 100 100 Final Exam 70.59 70.59 70.59 15. Details of Course Topics 1. Introduction a. Overview of Symmetric and Public-Key Cryptography b. Basic Terminology Mode of Delivery (eg : Lecture, Tutorial, Workshop, Seminar, etc.) Indicate allocation of SLT (lecture, tutorial, lab) for each subtopic Lecture Tutorial 2 1 Ver.1, Rev.2 Page2 of 6

c. Cryptanalysis Brute Force and Cryptanalytic Attacks 2. Finite Fields and Computational Number Theory a. Groups, Rings, Fields b. Modular Arithmetic c. Finite Fields of the Form GF(p) and GF(2n) d. Prime Numbers, the Greatest Common Divisor, the Euclidean Algorithm, Multiplicative Inverse e. Euler s Phi Function, Fermat s and Euler s Theorem, the Chinese Remainder Theorem f. Discrete Logarithm Problem and Diffie-Hellman Problem 3. Classical Ciphers a. Symmetric Cipher Model b. Substitution Ciphers c. Transposition Ciphers d. The Security of Classical Ciphers 4. Symmetric Encryption a. The Feistel Networks b. The Data Encryption Standard (DES) c. The Security of DES d. Triple DES e. The Advanced Encryption Standard (AES) f. Block Cipher Modes of Operation - ECB, CBC, CFB, OFB, CTR g. Stream Ciphers and RC4 5. Message Authentication and Hash Functions a. Authentication Requirements and Functions b. Message Authentication Codes (MAC) c. Hash Functions d. Security of Hash Functions and MAC 4 2 2 1 5 3 3 1 Ver.1, Rev.2 Page3 of 6

e. Specific MACs - HMAC, CBC- MAC, CMAC f. Specific Hash Functions SHA- 1 6. Asymmetric (Public-Key) Encryption a. Asymmetric Encryption Model b. The RSA Encryption c. The Rabin Encryption d. The ElGamal Encryption e. The insecurity of the textbook version of RSA, Rabin and ElGamal Encryptions 6 3 f. Introduction to Elliptic Curve Cryptosystems 7. Digital Signature a. Security Requirements for Signature Schemes b. The RSA Signature c. The ElGamal Signature 4 2 d. The Digital Signature Algorithm (DSA) e. The security of RSA and ElGamal signature schemes, and DSA 8. Key Establishment and Key Management a. Key Establishment Symmetric Techniques (KDC) and Asymmetric Techniques (Diffie- Hellman Key Exchange) b. Digital Certificates, Certification 2 1 Authority (CA), Public Key Infrastructure (PKI) Total 28 14 Total Student Face to Face / Guided Learning Time (SLT) Learning Independent Learning Lecture 28 28 Tutorials 14 14 Laboratory/Practical 0 0 Presentation 0 0 Assignment 0 10 Mid Term Test 1 5 Final Exam 2 16 Ver.1, Rev.2 Page4 of 6

Quizzes 2 times 2 Sub Total 45 75 Total SLT 120 16. Credit Value 120/40 = 3 17. Reading Materials : Textbooks William Stallings, (2013). Cryptography and Network Security - Principles and Practices, 6 th Edition, Prentice Hall. Wenbo Mao, (2003). Modern Cryptography: Theory and Practice, Wiley 2003. Reference Material (including Statutes for Law) D. Stinson, (2002). Cryptography: Theory and Practice, CRC Press Inc., 2 nd Edition. ISBN 1-58488-206-9. Bruce Schneier. Applied Cryptography, 2 nd Edition - Protocols, Algorithms and Source Code in C, John Wiley & Sons. ISBN:0-471-12845-7 Alfred J. Menezes, Paul C. van Oorshot and Scott A. Vanstone, (2001). Handbook of Applied Cryptography, CRC Press. WadeTrappe, Lawrence Washington. Introduction to Cryptography with Coding Theory, Second Edition, Prentice Hall. ISBN : 0-13-186239-1. M. G. Luby, (1996). Pseudorandomness and Cryptographic Applications, Princeton University Press. R. E. Smith, (1997). Internet Cryptography, Addison-Wesley. Appendix (to be compiled when submitting the complete syllabus for the programme) : 1. Mission and Vision of the University and Faculty 2. Programme Objectives or Programme Educational Objectives 3. Programme Outcomes (POs) 4. Mapping of POs to the 8 MQF domain 5. Summary of the Bloom s Taxonomy s Domain Coverage in all the Los in the format below : Learning Outcomes Bloom s Taxonomy Domain Subject (please state the Affective Cognitive Psychomotor learning 0utcomes) ABC1234 Learning Outcome 1 Learning Outcome 2 Learning Outcome 3 Learning Outcome 4 DEF5678 Learning Outcome 1 Learning Outcome 2 Learning Outcome 3 Learning Outcome 4 Ver.1, Rev.2 Page5 of 6

6. Summary of LO to PO measurement 7. Measurement and Tabulation of result for LO achievement 8. Measurement Tabulation of result for PO achievement Ver.1, Rev.2 Page6 of 6