About this course
Introduction:
Cryptography is the art and science of making a cryptosystem that is capable of providing information security. Cryptography deals with the actual securing of digital data. It refers to the design of mechanisms based on mathematical algorithms that provide fundamental information security services. You can think of cryptography as the establishment of a large toolkit containing different techniques in security applications The art and science of breaking the cipher text is known as cryptanalysis. Cryptanalysis is the sister branch of cryptography and they both co-exist. The cryptographic process results in the cipher text for transmission or storage. It involves the study of cryptographic mechanism with the intention to break them. Cryptanalysis is also used during the design of the new cryptographic techniques to test their security strengths.
Objectives:
- · Describe some of the basic concepts of cryptography.
- · Describe encryption and is uses in cybersecurity
- · Identify the fundamental concepts of cryptography driving requirements and benefits.
- · Recognize symmetric encryption methods
- · Modern cryptography concerns itself with the following four objectives:
1. Confidentiality - The information cannot be understood by anyone for whom it was unintended.
2. Integrity
3. Non-repudiation
4. Authentication
Course Outlines:
Modern Cryptography
· Characteristics of Modern Cryptography
· Context of Cryptography
· Cryptography
· Cryptanalysis
· Security Services of Cryptography
· Confidentiality
· Data Integrity
· Authentication
· Non-repudiation
· Cryptography Primitives
Ø Cryptosystems
· Cryptosystems
· Key Space
· Types of Cryptosystems
· Challenge of Public Key Cryptosystem
· Relation between Encryption Schemes
Ø Attacks On Cryptosystems
· Assumptions of Attacker
· Environment around Cryptosystem
· Details of the Encryption Scheme
· Availability of Ciphertext
· Availability of Plaintext and Ciphertext
· Cryptographic Attacks
· Practicality of Attacks
Ø Traditional Ciphers
· Earlier Cryptographic Systems
· Caesar Cipher
· Monoalphabetic and Polyalphabetic Cipher
· Playfair Cipher
· Vigenère Cipher
· Transposition Cipher
Ø Modern Symmetric Key Encryption
· Block Ciphers
· Stream Ciphers
· Padding in Block Cipher
· Block Size
· Block Cipher Schemes
Ø Feistel Block Cipher
· Encryption Process
· Decryption Process
· Number of Rounds
Ø Data Encryption Standard
· Initial and Final Permutation
· Round Function
· Key Generation
· DES Analysis
Ø Triple DES
· 3-KEY Triple DES
Ø Advanced Encryption Standard
· Operation of AES
· Encryption Process
· Decryption Process
· AES Analysis
Ø Block Cipher Modes of Operation
· Electronic Code Book (ECB) Mode
· Cipher Block Chaining (CBC) Mode
· Cipher Feedback (CFB) Mode
· Output Feedback (OFB) Mode
· Counter (CTR) Mode
Ø Public Key Encryption
· Public Key Cryptography
· RSA Cryptosystem
· El Gamal Cryptosystem
· Elliptic Curve Cryptography (ECC)
· RSA and El Gamal Schemes – A Comparison
Ø Data Integrity in Cryptography
· Threats to Data Integrity
· Passive Threats
· Active Threats
Ø Cryptography Hash functions
· Features of Hash Functions
· Properties of Hash Functions
· Design of Hashing Algorithms
· Popular Hash Functions
· Applications of Hash Functions
· Data Integrity Check
Ø Message Authentication
· Message Authentication Code (MAC)
· Limitations of MAC
Ø Cryptography Benefits & Drawbacks
· Cryptography – Benefits
· Cryptography – Drawbacks
· Future of Cryptography
Who should attend?
- · Cryptographer
- · Security analyst
- · Security consultant
- · Security architect
- · Forensic computer analyst
Learning Outcomes:
- · Describe some of the basic concepts of cryptography.
- · Describe encryption and is uses in cybersecurity
- · Identify the fundamental concepts of cryptography driving requirements and benefits.
- · Recognize symmetric encryption methods
- · Modern cryptography concerns itself with the following four objectives:
1. Confidentiality. The information cannot be understood by anyone for whom it was unintended.
2. Integrity
3. Non-repudiation
4. Authentication
End of Course
After completion of the course students must undertake the exam. Once the exam is passed, it is considered as end of the course.