NATIONAL INSTITUTE OF TECHNOLOGY, ARUNACHAL PRADESH, YUPIA, Pin-791112 (Established by MHRD, Govt. of India) Website : www.nitap.in, Fax No: (0360) 2284972 E-Mail: nitarunachal@gmail.com / admin@nitap.in Exercises Proposed for teaching in (July – December, 2015 Semester) 1. Name of the Teacher: Subhasish Banerjee 2. Department: Computer Science and Engineering 3. Course Title: Cryptography and Information Security 4. Course code: MCSE - 912 5. Course Hands out (in reference to framed & approved syllabus) (maximum 500 words) ____________________________________________________________________ Course Contents Introduction of Information Security, Cryptography, Conventional Encryption, Symmetric key cipher: Traditional technique: Substitution cipher, Transmission cipher, Stream Cipher, Block Cipher, Roaster Machine. Contact Hours 7 hrs Modern Symmetric Techniques, Mathematics of symmetric key cryptography, Cryptanalysis of classical ciphers, General Attacks, Secret and Private Key Cryptography, DES, Modes of operation of DES, Automatic Variable Key, Proof of DES, Merits and Demerits of DES, Quantification of Performance, TDES, Advanced Encryption Standard/AES, Comparison of Secret Key Systems, Modes of operation of AES Limitations of AES, Limitation of Secret or Private Key Crypto systems. 5 hrs Asymmetric key cryptography: Mathematics of Asymmetric key cryptography, Public Key Cryptography RSA Algorithm, Limitations of RSA Algorithm, Comparison of RSA and TRAP DOOR Public Key Crypto systems, Rabin Cryptosystem, ElGamal Cryptosystem, Elliptic Curve Cryptosystems. 7 hrs Key management: Key Transport Protocols, Needham Schroeder Protocol, Key Agreement Protocol, Diffie -Hellman Protocol, Station to Station Protocol, Merkless Puzzle Technique of key agreement, Public Key Distribution Message integrity and message authentication, Cryptography hash function, Digital Signature, Entity Authentication. 6 hrs 5 hrs NATIONAL INSTITUTE OF TECHNOLOGY, ARUNACHAL PRADESH, YUPIA, Pin-791112 (Established by MHRD, Govt. of India) Website : www.nitap.in, Fax No: (0360) 2284972 E-Mail: nitarunachal@gmail.com / admin@nitap.in Networks security: Application Layer: PGP and S/MIME, Transport Layer: SSL and TLS, Network Layer: IPSec, Advanced Error Control Techniques in Network. Virtual private networks; E-commerce security: SET, Digicash. Information security management. 7 hrs 3 hrs 6. Books/Literature to be followed: (a) Books (Min. 2 texts + 3 references) (i) Title Information Technology Network and Internet Author C. T. Bhunia Publisher New Age Publication Edition First Edition (ii) Title Author Publisher Edition Cryptography and Network Security B. A. Forouzan, D. Mukhopadhyay Tata McGraw Hill Second Edition (iii) Title Author Publisher Edition Cryptography and Network Security W. Stallings Pearson Fifth Edition (iv) Title Author Publisher Edition Cryptography Theory and Practice D. R. Stinson Chapman & Hall/CRC Third edition (v) Title Author Publisher Edition Cryptography and Network Security Atul Kahate Tata McGraw-Hill Second Edition (b) Magazines/Journals (Minimum 5) (i) Information Security - SC Magazine, Haymarket Media Inc., United State (ii) InfoSec Magazines, United Kingdom (iii)Journal of Computer Security, IOS press, Netherland (iv) International Journal of Information Security - Springer, United State NATIONAL INSTITUTE OF TECHNOLOGY, ARUNACHAL PRADESH, YUPIA, Pin-791112 (Established by MHRD, Govt. of India) Website : www.nitap.in, Fax No: (0360) 2284972 E-Mail: nitarunachal@gmail.com / admin@nitap.in (v) Journal of Information Security and Applications - Elsevier, Netherland 7. Mode of Teaching: J.C Bose/S. N. Bose (please tick). S. N. Bose 8. If the course is of practices, list the experiments to be offered. Programming Language - C/ JAVA/ C#/ Python (i). Write a program implement Euclidian and Extended Euclidian Algorithm to find GCD of two integer numbers. (ii). Write a program to find the inverse: Additive and multiplicative. (iii). Write the source code to implement the following Traditional Symmetric Cipher techniques for data Encryption/Decryption. a) Mono alphabetic Cipher: Additive, Multiplicative, Affine. b) Poly alphabetic Cipher: Autokey cipher, Playfair cipher, Hill cipher, Vigenere cipher. c) Transposition cipher. (iv). Write a program to Encrypt/Decrypt the information in Modern Symmetric Encryption based on Data Encryption (DES). (v). Write a program to Encrypt/Decrypt the information in Modern Symmetric Encryption based on Advance Encryption Standard (AES). (vi). Write a program to demonstrate the key generation, encryption and decryption operation based on the following Asymmetric Cipher techniques. a) RSA cryptosystem b) Elgamal cryptosystem c) Rabin cryptosystem d) Elliptic Curve Cryptosystem. (vii). Write the programs to demonstrate Digital Signatures based on RSA, Elgamal, etc. (viii). Write the programs to perform the Entity Authentication based on Challenge response, Zero knowledge, etc. (ix). Write a program to demonstrate Key management mechanism based on Diffie- Hellman, etc. (x). Mini project assignment to the individual student. Are the manuals ready for the experiments to be conducted? Yes Remarks/ Endorsement by the HoD With his /her signature with date Name of the Teacher: Subhasish Banerjee Designation: Assistant Professor Signature with Date: