Cryptography is essentially the science of writing in secret code. In data and telecommunications, cryptography has specific security requirements, such as authentication, privacy or confidentiality, integrity, and non-repudiation. To meet these security requirements, we employ secret key (or symmetric) cryptography, public-key (or asymmetric) cryptography, and hash functions.
In the first part of the course, we will review a number of different ciphers that were used before World War II. These ciphers would be easily broken nowadays, since cryptography has advanced quickly over the past couple of decades with the advent of modern computers. We will cover block cipher algorithms and describe the advanced encryption standard for a symmetric-key encryption. We will also learn about the important MD5 and SHA-1 hash functions as well as the message authentication code.This course will focus on public key cryptography, which is best exemplified by the RSA algorithm We will also learn about elliptic curves, another important mathematical function in cryptography.
In the final part of the course, we will have an overview and discussion of public key infrastructure.
Course Status : | Ongoing |
Course Type : | Core |
Language for course content : | English |
Duration : | 8 weeks |
Category : |
|
Credit Points : | 2 |
Level : | Undergraduate |
Start Date : | 08 Jul 2024 |
End Date : | 31 Oct 2024 |
Enrollment Ends : | 31 Aug 2024 |
Exam Date : | 14 Dec 2024 IST |
Course Exam Shift : | Shift-II: (03:00 P.M. to 6:00 PM) |
Note: This exam date is subject to change based on seat availability. You can check final exam date on your hall ticket.
DOWNLOAD APP
FOLLOW US