Stream ciphers: Pseudo-random generators, Attacks on the one-time pad, Linear generators, Cryptanalysis of linear congruential generators,
Block ciphers: Pseudorandom functions and permutations, DES, AES, modes of operation.
Message integrity: Cryptographic hash functions, message authentication code, CBC MAC and its security, Cryptographic hash functions-based MACs, SHA512, SHA3.
Public key encryption: RSA, Rabin, Knapsack cryptosystems, Diffie-Hellman key exchange protocol, ElGamal encryption, Elliptic curve cryptography.
Digital signatures: Generic signature schemes, RSA, ElGamal, ECDSA
Reference Book:
1. William Stallings, Cryptography and Network Security Principles and Practices, Seventh edition, Pearson; 2017 2. Wade Trappe, Lawrence C Washington, Introduction to Cryptography with coding theory, Pearson; 2006 3. W. Mao, Modern Cryptography – Theory and Practice, Pearson Education; 2004 4. Charles P. Pfleeger, Shari Lawrence Pfleeger, Security in computing, Fifth Edition, Prentice Hall of India; 2015
Text Book:
1. Douglas Robert Stinson, Maura Paterson. Cryptography: Theory and Practice (Textbooks in Mathematics). Fourth Edition. Chapman and Hall/CRC;2018.