IT

CCS351: Modern Cryptography syllabus for IT 2021 regulation (Professional Elective-IV)

Modern Cryptography detailed syllabus for Information Technology (IT) for 2021 regulation curriculum has been taken from the Anna Universities official website and presented for the IT students. For course code, course name, number of credits for a course and other scheme related information, do visit full semester subjects post given below.

For Information Technology 6th Sem scheme and its subjects, do visit IT 6th Sem 2021 regulation scheme. For Professional Elective-IV scheme and its subjects refer to IT Professional Elective-IV syllabus scheme. The detailed syllabus of modern cryptography is as follows.

Modern Cryptography

Course Objectives:

Download the iStudy App for all syllabus and other updates.
Get it on Google Play

Unit I

INTRODUCTION 6 Basics of Symmetric Key Cryptography, Basics of Asymmetric Key Cryptography, Hardness of Functions. Notions of Semantic Security (SS) and Message Indistinguishability (MI): Proof of Equivalence of SS and MI, Hard Core Predicate, Trap-door permutation, Goldwasser-Micali Encryption. Goldreich-Levin Theorem: Relation between Hardcore Predicates and Trap-door permutations.

Unit II

Download the iStudy App for all syllabus and other updates.
Get it on Google Play

Unit III

RANDOM ORACLES 6 Provable Security and asymmetric cryptography, hash functions. One-way functions: Weak and Strong one-way functions. Pseudo-random Generators (PRG): Blum-Micali-Yao Construction, Construction of more powerful PRG, Relation between One-way functions and PRG, Pseudorandom Functions (PRF)

Unit IV

Download the iStudy App for all syllabus and other updates.
Get it on Google Play

Unit V

MESSAGE AUTHENTICATION CODES 6 Left or Right Security (LOR). Formal Definition of Weak and Strong MACs, Using a PRF as a MAC, Variable length MAC. Public Key Signature Schemes: Formal Definitions, Signing and Verification, Formal Proofs of Security of Full Domain Hashing. Assumptions for Public Key Signature Schemes: One-way functions Imply Secure One-time Signatures. Shamir’s Secret Sharing Scheme. Formally Analyzing Cryptographic Protocols. Zero Knowledge Proofs and Protocols.

Practical Exercises:

Download the iStudy App for all syllabus and other updates.
Get it on Google Play

Course Outcomes:

  1. Interpret the basic principles of cryptography and general cryptanalysis.
  2. Determine the concepts of symmetric encryption and authentication.
  3. Identify the use of public key encryption, digital signatures, and key establishment.
  4. Articulate the cryptographic algorithms to compose, build and analyze simple cryptographic solutions.
  5. Express the use of Message Authentication Codes.

Text Books:

  1. Hans Delfs and Helmut Knebl, Introduction to Cryptography: Principles and Applications, Springer Verlag.
  2. Wenbo Mao, Modern Cryptography, Theory and Practice, Pearson Education (Low Priced Edition)

Reference Books:

Download the iStudy App for all syllabus and other updates.
Get it on Google Play

For detailed syllabus of all the other subjects of Information Technology 6th Sem, visit IT 6th Sem subject syllabuses for 2021 regulation.

For all Information Technology results, visit Anna University IT all semester results direct link.

Leave a Reply

Your email address will not be published. Required fields are marked *

*