Data Security and Encryption CS465
Data Security and Encryption CS465
Data Security and Encryption CS465
CS465
BOOK:
WILLIAM STALLINGS, “CRYPTOGRAPHY AND NETWORK SECURITY: PRINCIPLES AND PRACTICE”, 6TH EDITION, PEARSON INC. (2014)
REFERENCE BOOKS:
1. JONATHAN KATZ AND YEHUDA LINDELL. INTRODUCTION TO MODERN CRYPTOGRAPHY 2ED.CRC PRESS, 2014.
2. CHRISTOF PAAR AND JAN PELZL. UNDERSTANDING CRYPTOGRAPHY. SPRINGER, 2010.
3. NIGEL SMART. CRYPTOGRAPHY MADE SIMPLE. SPRINGER, 2016.
4. JEAN-PHILIPPE AUMASSON. SERIOUS CRYPTOGRAPHY: A PRACTICAL INTRODUCTION TO MODERN ENCRYPTION. NO STARCH PRESS, 2017.
BIOGRAPHY
• Overview
• Computer Security Concept
• The OSI Security Architecture
• Security Attacks
• Security Services
• Security Mechanisms.
• A model for Network Security
PART ONE (SYMMETRIC CIPHERS)
• Classical Encryption Model • Basic Concepts in Number Theory and Finite Felds
• Symmetric Cipher Model
• Divisibility and The Division Algorithm
• Substitution Techniques
• The Euclidean Algorithm
• Transposition Techniques
• Rotor Machines • Modular Arithmetic
• Steganography • Groups, Rings and Fields
• Block Ciphers and data encryption standard • Advance Encryption Standard
• Block Cipher Principles
• The origins AES
• The data encryption standard
• A DES Example • AES Structure
• The Strength of DES • AES Round Functions
• Differential and Liner Cryptanalysis • AES key expansion
• Block Cipher Design Principles
• AES Implementation
PART ONE (SYMMETRIC CIPHERS)
• Two Simple Hash Function • MAC based on Block Ciphers: DAA and CMAC
• Book: • References
• Hacking Project • Research Papers
• Block Cipher Projects • Algorithms
• Research Projects • ML in Cyber-Security
• Programming Porjects
GRADING