Modern Cryptography detailed syllabus for Information Technology (IT) for 2021 regulation curriculum has been taken from the Anna Universities official website and presented for the IT students. For course code, course name, number of credits for a course and other scheme related information, do visit full semester subjects post given below.
For Information Technology 6th Sem scheme and its subjects, do visit IT 6th Sem 2021 regulation scheme. For Professional Elective-IV scheme and its subjects refer to IT Professional Elective-IV syllabus scheme. The detailed syllabus of modern cryptography is as follows.
Course Objectives:
Download the iStudy App for all syllabus and other updates.

Unit I
INTRODUCTION 6 Basics of Symmetric Key Cryptography, Basics of Asymmetric Key Cryptography, Hardness of Functions. Notions of Semantic Security (SS) and Message Indistinguishability (MI): Proof of Equivalence of SS and MI, Hard Core Predicate, Trap-door permutation, Goldwasser-Micali Encryption. Goldreich-Levin Theorem: Relation between Hardcore Predicates and Trap-door permutations.
Unit II
Download the iStudy App for all syllabus and other updates.

Unit III
RANDOM ORACLES 6 Provable Security and asymmetric cryptography, hash functions. One-way functions: Weak and Strong one-way functions. Pseudo-random Generators (PRG): Blum-Micali-Yao Construction, Construction of more powerful PRG, Relation between One-way functions and PRG, Pseudorandom Functions (PRF)
Unit IV
Download the iStudy App for all syllabus and other updates.

Unit V
MESSAGE AUTHENTICATION CODES 6 Left or Right Security (LOR). Formal Definition of Weak and Strong MACs, Using a PRF as a MAC, Variable length MAC. Public Key Signature Schemes: Formal Definitions, Signing and Verification, Formal Proofs of Security of Full Domain Hashing. Assumptions for Public Key Signature Schemes: One-way functions Imply Secure One-time Signatures. Shamir’s Secret Sharing Scheme. Formally Analyzing Cryptographic Protocols. Zero Knowledge Proofs and Protocols.
Practical Exercises:
Download the iStudy App for all syllabus and other updates.

Course Outcomes:
- Interpret the basic principles of cryptography and general cryptanalysis.
- Determine the concepts of symmetric encryption and authentication.
- Identify the use of public key encryption, digital signatures, and key establishment.
- Articulate the cryptographic algorithms to compose, build and analyze simple cryptographic solutions.
- Express the use of Message Authentication Codes.
Text Books:
- Hans Delfs and Helmut Knebl, Introduction to Cryptography: Principles and Applications, Springer Verlag.
- Wenbo Mao, Modern Cryptography, Theory and Practice, Pearson Education (Low Priced Edition)
Reference Books:
Download the iStudy App for all syllabus and other updates.

For detailed syllabus of all the other subjects of Information Technology 6th Sem, visit IT 6th Sem subject syllabuses for 2021 regulation.
For all Information Technology results, visit Anna University IT all semester results direct link.