National Institute of Technology Rourkela

राष्ट्रीय प्रौद्योगिकी संस्थान राउरकेला

ଜାତୀୟ ପ୍ରଯୁକ୍ତି ପ୍ରତିଷ୍ଠାନ ରାଉରକେଲା

An Institute of National Importance

Syllabus

Course Details

Subject {L-T-P / C} : MA5408 : Number Theory and Cryptography { 3-0-0 / 3}

Subject Nature : Theory

Coordinator : Kamalesh Acharya

Syllabus

Module 1 :

Introduction to cryptography, Classical Cryptosystem, Block Cipher. Data Encryption Standard (DES), Triple DES, Modes of Operation, Stream Cipher. LFSR based Stream Cipher.

Module 2 :

Mathematical background, Abstract algebra, Number Theory. Modular Inverse, Extended Euclid Algorithm, Fermat’s Little Theorem, Fermat number, Willson theorem and application. Euler Phi-Function, Eulers theorem, The Chinese Remainder Theorem, Fast Exponentiation.

Module 3 :

Advanced Encryption Standard (AES), Introduction to Public Key Cryptosystem, Diffie-Hellman Key Exchange, Primarily Testing, ElGamal Cryptosystem, Elliptic Curve over the Reals, Elliptic curve Modulo a Prime. Generalized ElGamal Public Key Cryptosystem, Rabin Cryptosystem.


Module 4 :

Message Authentication, Digital Signature, Key Management, Key Exchange, Hash Function. Cryptographic Hash Function, Secure Hash Algorithm (SHA), Digital Signature Standard (DSS). Stream Ciphers, Shamir’s secret sharing and BE, Identity-based Encryption (IBE).

Course Objective

1 .

To acquaint students with the basic concepts in need for security mechanism, classical and traditional Encryption techniques.

2 .

Identify and apply various concepts of number theory.

3 .

To impart knowledge to students regarding the significance of message confidentiality, Integrity and availability using Cryptography.

4 .

Under standing message authentication, digital signature

Course Outcome

1 .

Understand Security of Classical Encryptions.

2 .

Realize the various mathematical techniques in cryptography, including number theory, Finite Field, modulo operator, Elliptic Curve Arithmetic and Discrete Logarithm.

3 .

Analyze Modern block and stream ciphers, Data Encryption Standard (DES), Advanced Encryption Standard (AES), IDEA and Key Exchange Algorithms.

4 .

Analyze Asymmetric ciphers: RSA, ElGamal, RABIN Cryptosystem.

Essential Reading

1 .

Douglus R. Stinson, Cryptography: theory and practice, Chapman & Hall/CRC, 2006.

Supplementary Reading

1 .

William Stallings, Cryptography and Network security: Principles and Practice, Pearson Education, India

Journal and Conferences

1 .

.