advertisement

1. Title of subject Cryptography and Data Security 2. Subject code TCD2221 3. Status of subject Major 4. Version Date of Previous Version: Year 2006 Date of New Version : June 2007 5. Credit hour 3 28 Hours of Lecture 14 Hours of Tutorial LAN credit hours equivalence: 2.67 6. Semester Trimester 2 (Delta Level) 7. Pre-Requisite Data Structures and Algorithms (TCS 1011) 8. Methods of teaching 28 Hours of Lecture 14 Hours of Tutorial 9. Assessment Coursework: 50% Final Exam: 50% Total : 100% 10. Teaching staff (Proposed) Ismail Ahmad 11. Objective of subject To introduce to the students the science and study of methods of data protection computer and communication systems from unauthorized disclosure and modification, to show how to develop techniques for verification, identification, key safeguarding schemes and key distribution protocols and to introduce students to different methods of encrypting data for security purposes. 12. Synopsis of subject This course covers symmetric and asymmetric encryption methods, cryptographic techniques, security and legality issues in cryptography and data security. Kursus ini meliputi, kaedah-kaedah penyuntingan, teknik-teknik kriptografi, isu-isu keselamatan dan kesahihan dalam kriptografi dan keselamatan data. By the end of the subject, students should be able to: 13. Learning Outcomes Understand the concepts and the fundamentals of encryption methods. Able to understand and work with different encryption methods. Understand the different cryptographic techniques. Programmes Outcomes % of contribution 5 Ability to apply soft skills in work and career related activities 35 Good understanding of fundamental concepts Acquisition and mastery of knowledge in specialized area 20 20 Acquisition of analytical capabilities and problem solving skills Adaptability and passion for learning 5 5 Cultivation of innovative mind and development of entrepreneurial skills Understanding of the responsibility with moral and professional ethics 14. Details of subject 1. 10 Topics Covered Hours Introduction Definition of the Cryptographic System: Encryption & Decryption, Symmetric & Asymmetric Ciphers Background History of Cryptography Steganography Message Security Threats: Passive & Active attacks Types of Cryptanalytic Attacks (ciphertext only, known plaintext, chosen plaintext, chosen ciphertext, chosen text) The goals of cryptography and data security: Confidentiality, Integrity, Authenticity 3 2. 3. 4. 5. 6. Symmetric Encryption Brief Introduction to Symmetric Key Encryption Model Classical ciphers: Transposition ciphers, Substitution ciphers, Knapsack ciphers Product Cipher: DES and triple DES, brief introduction to AES Symmetric Block Cipher Characteristics: Block Cipher Modes of Operations (ECB, CBC, CFB, CTR, OFB). Stream Cipher and One-Time Pads (Perfect Secrecy). Number Theory Modular Arithmetic Prime Numbers Greatest Common Divisor (GCD) Multiplicative Inverse Fermat’s Little Theorem Euler Totient Function Euler’s Theorem Asymmetric Encryption Brief Introduction to the Asymmetric Key Encryption Model Asymmetric (Public-Key) Encryption Characteristics Public Key Encryption: RSA Authentication Password Authentication, Message Authentication Code (MAC) properties and basic uses of MAC Hash properties and basic uses of hash Brief Introduction to the Digital Signature Model and Threats to Digital Signatures (i.e. Replay Attacks) Key Distribution, Key Management & Digital Certificates Brief introduction to Key Distribution Methods Simple Key Distribution (Merkle) Key Management Diffie-Hellman Key Exchange Public Key Infrastructure (PKI): Public Key Certificates, Certificate Authority (CA) & Certificate Servers Total Contact Hours 1. 15. Text Text books 2. 8 4 3 5 5 28 William Stallings, Cryptography and Network Security - Principles and Practices, 4th Edition, Prentice Hall.ISBN:0-13-111502-2 (2006). Atul Kahate, Cryptography and Network Security, McGraw-Hill, ISBN:0070494835 (2003) References 1. 2. 3. WadeTrappe, Lawrence Washington, Introduction to Cryptography with Coding Theory, Second Edition, Prentice Hall.ISBN : 0-13-186239-1 (2006) Bruce Schneier, Applied Cryptography, 2nd Edition Protocols, Algorithms and Source Code in C,John Wiley & Sons.ISBN:0-471-12845-7 (1996) Josef Pieprzyk,Thomas Hardjono,Jennifer Seberry, Fundamentals of Computer Security, Springer-Verlag.ISBN: 3-540-43101-2 (2003)