Cryptography detail syllabus for Electronics & Communication Engineering (ECE), 2017 scheme is taken from VTU official website and presented for VTU students. The course code (17EC744), and for exam duration, Teaching Hr/week, Practical Hr/week, Total Marks, internal marks, theory marks, duration and credits do visit complete sem subjects post given below.
For all other ece 7th sem syllabus for be 2017 scheme vtu you can visit ECE 7th Sem syllabus for BE 2017 Scheme VTU Subjects. For all other Professional Elective-3 subjects do refer to Professional Elective-3. The detail syllabus for cryptography is as follows.
Course Objectives:
This Course will enable students to:
- Enable students to understand the basics of symmetric key and public key cryptography.
- Equip students with some basic mathematical concepts and pseudorandom number generators required for cryptography.
- Enable students to authenticate and protect the encrypted data.
- Enrich knowledge about Email, IP and Web security.
Module 1
For complete syllabus and results, class timetable and more pls download iStudy. Its a light weight, easy to use, no images, no pdfs platform to make students life easier.
Module 2
Classical Encryption Techniques: Symmetric cipher model, Substitution techniques, Transposition techniques, Steganography (Text 1: Chapter 1) SYMMETRIC CIPHERS: Traditional Block Cipher structure, Data Encryption Standard (DES) (Text 1: Chapter 2: Section1, 2)
Module 3
SYMMETRIC CIPHERS: The AES Cipher. (Text 1: Chapter 4: Section 2, 3, 4) Pseudo-Random-Sequence Generators and Stream Ciphers: Linear Congruential Generators, Linear Feedback Shift Registers, Design and analysis of stream ciphers, Stream ciphers using LFSRs (Text 2: Chapter 16: Section 1, 2, 3, 4)
Module 4
For complete syllabus and results, class timetable and more pls download iStudy. Its a light weight, easy to use, no images, no pdfs platform to make students life easier.
Module 5
One-Way Hash Functions: Background, Snefru, N-Hash, MD4, MD5, Secure Hash Algorithm [SHA],One way hash functions using symmetric block algorithms, Using public key algorithms, Choosing a one-way hash functions, Message Authentication Codes. Digital Signature Algorithm, Discrete Logarithm Signature Scheme (Text 2: Chapter 18: Section 18.1 to 18.5, 18.7, 18.11 to 18.14 and Chapter 20: Section 20.1, 20.4)
Course Outcomes:
After studying this course, students will be able to:
- Use basic cryptographic algorithms to encrypt the data.
- Generate some pseudorandom numbers required for cryptographic applications.
- Provide authentication and protection for encrypted data.
Text Books:
- William Stallings , Cryptography and Network Security Principles and Practice, Pearson Education Inc., 6th Edition, 2014, ISBN: 978-93-325-1877-3
- Bruce Schneier, Applied Cryptography Protocols, Algorithms, and Source code in C, Wiley Publications, 2nd Edition, ISBN: 9971-51-348-X
Reference Books:
- Cryptography and Network Security, Behrouz A. Forouzan, TMH, 2007.
- Cryptography and Network Security, Atul Kahate, TMH, 2003.
For detail syllabus of all other subjects of BE Ece, 2017 regulation do visit Ece 7th Sem syllabus for 2017 Regulation.
Dont forget to download iStudy for latest syllabus and results, class timetable and more.