X

Cryptography

By Prof. Rajesh Kumar Bawa,   |   Department of Computer Science, Punjabi Univerisity, Patiala - 147002
Learners enrolled: 410

Cryptography is essentially the science of writing in secret code.  In data and telecommunications, cryptography has specific security requirements, such as authentication, privacy or confidentiality, integrity, and non-repudiation.  To meet these security requirements, we employ secret key (or symmetric) cryptography, public-key (or asymmetric) cryptography, and hash functions.

In the first part of the course, we will review a number of different ciphers that were used before World War II.  These ciphers would be easily broken nowadays, since cryptography has advanced quickly over the past couple of decades with the advent of modern computers.  We will cover block cipher algorithms and describe the advanced encryption standard for a symmetric-key encryption.  We will also learn about the important MD5 and SHA-1 hash functions as well as the message authentication code.This course will focus on public key cryptography, which is best exemplified by the RSA algorithm  We will also learn about elliptic curves, another important mathematical function in cryptography.

In the final part of the course, we will have an overview and discussion of public key infrastructure.

Summary
Course Status : Upcoming
Course Type : Core
Language for course content : English
Duration : 8 weeks
Category :
  • Computer Science
Credit Points : 2
Level : Undergraduate
Start Date : 07 Jul 2025
End Date : 31 Oct 2025
Enrollment Ends : 31 Aug 2025
Exam Date :
NCrF Level   : 5.0
Industry Details : Software, Cyber Security

Page Visits



Books and references

  1. Buchmann, J. (2013). Introduction to cryptography (2nd ed.). Springer.
  2. Ferguson, N., Schneier, B., & Kohno, T. (2010). Cryptography engineering: Design principles and practical applications. Wiley.
  3. Forouzan, B. A., & Mukhopadhyay, D. (2015). Cryptography and network security (2nd ed.). McGraw-Hill Education.
  4. Ghosh, A. (2012). Information security and cryptography. PHI Learning Pvt. Ltd.
  5. Katz, J., & Lindell, Y. (2020). Introduction to modern cryptography (3rd ed.). CRC Press.
  6. Menezes, A. J., Van Oorschot, P. C., & Vanstone, S. A. (1996). Handbook of applied cryptography. CRC Press.
  7. Oppliger, R. (2008). Contemporary cryptography (2nd ed.). Artech House.
  8. Padmavathi, G., & Reshma, M. (2013). Cryptography and network security. I.K. International Publishing House.
  9. Paar, C., & Pelzl, J. (2010). Understanding cryptography: A textbook for students and practitioners. Springer.
  10. Singh, S. (2000). The code book: The science of secrecy from ancient Egypt to quantum cryptography. Anchor Books.
  11. Stallings, W. (2017). Cryptography and network security: Principles and practice (7th ed.). Pearson.
  12. Trappe, W., & Washington, L. C. (2006). Introduction to cryptography with coding theory (2nd ed.). Pearson.

Instructor bio

Prof. Rajesh Kumar Bawa,

Department of Computer Science, Punjabi Univerisity, Patiala - 147002
Prof. Rajesh K. Bawa recently retired as Professor, Department of Computer Science, Punjabi University, Patiala. He also served as as Dean, Faculty of Computing Sciences, Punjabi University, Patiala. 

He  has done Ph.D in the area of Numerical Computing from IIT Kanpur in 1994.

He is having more than 30 years of teaching and Research at various Institutes. He also served SLIET, Longowal ( Deemed University) and Thapar Institute  at Patiala.

His present areas of interest are Discrete Mathematical Strucures for Computer Science, Computer Graphics, Digital Image Processing, Cloud Computing, Parallel and Scientific Computing.

He has guided 12 PhD students and presently 3 research scholars are pursuing their Ph.D’s under his supervision. Also he has guided around 70 M.Tech thesis also.

He has published many research papers in journals of reputed publishers such as Elsevier, Springer, Taylor and Francis etc 

He has presented papers in  many international and national conferences. 
Also he chaired many sessions in these conferences. He chaired a session in an International conferences of Computer Scientists and Engineers at Hong Kong and organized a session in an international Conference at Illinous Institute of Technology, Chicago, USA.
He was also Guest Editor of International journal of Neural, Parallel and Scientific Computation published by Dynamic Publishers, USA 
   

Course certificate

Internal Assessment
Weekly assessments released in the course shall be considered for Internal Marks and will carry 30 percent for the Overall Result. Out of all weekly assignments, the best/top five scores will be considered for the final Internal Assessment marks.

End-term Assessment
The final exam shall be conducted by NTA, and will carry 70 percent for the overall Result.

All students who obtain 40% marks in the internal assessment and 40% marks in the end-term proctored exam separately will be eligible for the SWAYAM Credit Certificate.


MHRD logo Swayam logo

DOWNLOAD APP

Goto google play store

FOLLOW US