Introduction to Cryptography - Syllabus
Embark on a profound academic exploration as you delve into the Introduction to Cryptography course () within the distinguished Tribhuvan university's CSIT department. Aligned with the 2065 Syllabus, this course (CSC-313) seamlessly merges theoretical frameworks with practical sessions, ensuring a comprehensive understanding of the subject. Rigorous assessment based on a 60+20+20 marks system, coupled with a challenging passing threshold of , propels students to strive for excellence, fostering a deeper grasp of the course content.
This 3 credit-hour journey unfolds as a holistic learning experience, bridging theory and application. Beyond theoretical comprehension, students actively engage in practical sessions, acquiring valuable skills for real-world scenarios. Immerse yourself in this well-structured course, where each element, from the course description to interactive sessions, is meticulously crafted to shape a well-rounded and insightful academic experience.
Goal: The course objective is to familiarize basic concepts of cryptography so as the students can use their understanding for information security purpose.
Units
Security, Attacks, Attack Types, Viruses, Worms, Trojan Horses, Classical Cryptography
Key Topics
-
Lexical Analysis
UN-2.1The process of breaking the source code into a series of tokens. It involves the specification and recognition of tokens, input buffer, and finite automata relevant to compiler construction.
-
Syntax Analysis
UN-2.2The process of analyzing the syntax of the source code. It involves basic parsing techniques, problem of left recursion, left factoring, ambiguous grammar, top-down parsing, bottom-up parsing, and LR parsing.
-
Semantic Analysis
UN-2.3The process of analyzing the meaning of the source code. It involves static and dynamic checks, typical semantic errors, scoping, type checking, syntax directed definitions, and translation.
-
Matrix Representations
UN-2.4This topic explains how matrices can be used to represent and perform geometrical transformations in computer graphics. It covers the basics of matrix operations and their applications in transformation matrices.
-
Window to View Port Transformation
UN-2.5This topic covers the process of transforming a window coordinate system to a view port coordinate system, including the concepts of windowing, viewing, and porting. It explains the importance of this transformation in computer graphics.
-
3D Viewing
UN-2.6This topic covers the concepts of 3D viewing, including camera models, view volumes, and projection types. It explains how 3D viewing is used to create realistic and interactive 3D graphics.
Key Topics
-
Cryptography
UN-301The practice and study of techniques for secure communication in the presence of third-party adversaries. It involves the use of algorithms to transform plaintext into unreadable ciphertext.
-
Cryptanalysis
UN-302The study of methods for obtaining the plaintext from the ciphertext without knowing the key. It involves breaking the encryption algorithm to access the encrypted data.
-
Cipher Structure
UN-303The design and architecture of encryption algorithms, including the use of substitution and permutation techniques to transform plaintext into ciphertext.
-
Encryption Algorithms
UN-304Mathematical procedures used to transform plaintext into ciphertext, ensuring confidentiality and integrity of data.
-
Data Encryption Standard (DES)
UN-305A symmetric-key block cipher that was widely used for encrypting data, but is now considered insecure due to its small key size.
-
International Data Encryption Algorithm (IDEA)
UN-306A symmetric-key block cipher that was designed to replace DES, but is no longer considered secure due to its vulnerabilities.
-
Advanced Encryption Standard (AES)
UN-307A symmetric-key block cipher that is widely used for encrypting data, known for its high security and efficiency.
-
Modes of Operation
UN-308Different ways of using a block cipher to encrypt data, including Electronic Codebook (ECB), Cipher Block Chaining (CBC), and others.
-
Symmetric Block Ciphers
UN-309A type of encryption algorithm that uses the same key for both encryption and decryption, dividing data into fixed-length blocks for processing.
-
Cipher Block Chaining (CBC)
UN-310A mode of operation for block ciphers, where each block of plaintext is XORed with the previous block of ciphertext before encryption.
-
Multiple Encryption DES
UN-311A method of encrypting data using multiple iterations of the DES algorithm, increasing the security of the encryption process.
Basic Number Theory, Factorization, Diffie-Hellman Key Exchange, Public Key Cryptography Algorithms, RSA.
One-time signatures, Digital Signature Standard (DSS).
Hashes, Motivation and applications. Cryptographically Secure Hashing, Secure Hash Algorithm (SHA), Encryption with Message Digest (MD), MD5.
Key Topics
-
Introduction to Audience and Purpose
AU-1An overview of the importance of understanding audience and purpose in technical writing, and how it sets the foundation for effective communication.
-
Meeting the Audience's Needs
AU-2Understanding the audience's requirements, expectations, and preferences to tailor the content and ensure it meets their needs.
-
Planning Your Document's Purpose
AU-3Defining the purpose of the document, including its goals, objectives, and key takeaways.
-
Defining Document Scope
AU-4Determining the boundaries and limitations of the document to ensure it stays focused and relevant.
-
Selecting the Appropriate Medium
AU-5Choosing the most suitable medium for the document, such as print, digital, or online, based on the audience and purpose.
IP Security, Web Security, Secure Socket Layer (SSL), Transport Layer Security (TLS), Different versions of SNMPs, PGP.