Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Indian Institute of Technology, Kharagpur

Internetwork Security

Indian Institute of Technology, Kharagpur and NPTEL via Swayam

This course may be unavailable.

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!

The aim of this course is to introduce the student to the areas of cryptography and cryptanalysis. This course develops a basic understanding of the algorithms used to protect users online and to understand some of the design choices behind these algorithms. Our aim is to develop a workable knowledge of the mathematics used in cryptology in this course. The course emphasizes to give a basic understanding of previous attacks on cryptosystems with the aim of preventing future attacks.

Syllabus

Week 1: Introduction to cryptography,  Classical Cryptosystem, Cryptanalysis on Substitution Cipher(Frequency Analysis ), Play fair Cipher, Block Cipher.

Week 2: Data Encryption Standard (DES), DES (Contd.), Triple DES, Modes of Operation, Stream Cipher, Pseudorandom Sequence.

Week 3: LFSR based Stream Cipher, Mathematical background, Abstract algebra, Number Theory.

Week 4: Modular Inverse, Extended  Euclid Algorithm, Fermat's Little Theorem, Eular Phi-Function, Eular's theorem, Quadratic Residue, Polynomial Arithmetic.

Week 5: Advanced Encryption Standard (AES), Introduction to Public Key Cryptosystem, Diffie-Hellman Key Exchange, Knapsack Cryptosystem, RSA Cryptosystem.

Week 6: Primarily Testing, ElGamal Cryptosystem, Elliptic Curve over the Reals, Elliptic curve Modulo a Prime.

Week 7: Generalised ElGamal Public Key Cryptosystem, Chinese Remainder Theorem, Rabin Cryptosystem, Legendre and Jacobi Symbol.

Week 8: Message Authentication, Digital Signature, Key Management, Hash Function

Week 9: Universal Hashing, Cryptographic Hash Function, Secure Hash Algorithm (SHA), Digital Signature Standard (DSS), More on Key Exchange Protocol.

Week 10: Cryptanalysis, Time-Memory Trade-off Attack, Differential Cryptanalysis, More on Differential Cryptanalysis, Linear Cryptanalysis

Week 11: Solving discrete log problem, Algebraic Attack, Implementation Attacks, side channel attack.

Week 12: Internetwork Security, SSL, PGP, Cloud Security

Tags

Reviews

Start your review of Internetwork Security

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.