You are on page 1of 2

Deptt.

of CSE & IT, JIIT, ODD SEM 2009

Page 1 of 2

Title Course Code Course Outline

Theory of Cryptography 08M41CI423 Topics


Mathematical Background of Cryptography Mathematical Foundations of Cryptography Computational Number Theory. Generating Randomness, Primes

Books
Foundation of Cryptography by Oded Goldreich, Cambridge University Press, ISBN: 9780521670524 Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press.

Cryptographic Techniques & Cryptanalysis Complexity Analysis of Cryptographic Algorithms Comparison of existing cryptographic algorithms based on computational complexity. Steganography and Multimedia watermarking Basics of Steganography. Image, Audio and Video Encryption and Watermarking Techniques.

Fundamentals of Multimedia, by ZeNian Li, Mark S. Drew, Prentice-Hall India, ISBN: 9788120328174 Multimedia security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property, by Chun-Shien Lu, ISBN: 9781591401926. Investigators guide to Steganography, by Gregory Kipper, CRC Press, ISBN: 978089324338. www.watermarkingworld.org Transactions on Data Hiding and

Multimedia Security International Conference on Multimedia, Internet & Video Technologies (MIV07)- Volume 7 EURASIP Journal on Applied Signal Processing Lecture Notes in Computer Science, Information Hiding , Springer-Verlag
Cryptographic protocols Symmetric/Asymmetric protocols, intermediate protocols, ZeroKnowledge Proofs, Esoteric Protocols. Attacks on protocols and countermeasures. New York, Inc Applied Cryptography by Bruce Schneier , John Wiley & Sons, ISBN: 0471-12845-7 Modern Cryptography: Theory and Practice Wenbo Mao- Prentice Hall. ISBN: 0130669431

Deptt. of CSE & IT, JIIT, ODD SEM 2009 Authentication Protocols Secure Shell, KERBEROS, Web Security using Secure Socket Layer/ Transport Layer Security, Pretty Good Privacy Pseudo Anonymity and Platform for Privacy Preferences Project Formal Approach towards cryptographic protocols Concepts of Semantic Security Formal Methods in design of cryptographic protocols Inductive approach for verifying cryptographic protocols Advanced Topics in Cryptography Quantum Cryptography, Elliptic Curve Cryptography, Wired equivalent Privacy War dialing, Wardriving and their tools.

Page 2 of 2 SSL and TLS Design and Building Secure Systems by Eric Rescola, Addison Wesley. ISBN: 321246772

Modern Cryptography: Theory and Practice Wenbo Mao- Prentice Hall. ISBN: 0130669431

Methodology: Lecture delivery will be descriptive, critical and interactive. Most readings will be from papers published on top security conferences or journals. The students will choose an area of cryptography for preparing and presenting a detailed case study. The required readings should be from papers published within the last 8-10 years.

Reference Books

Network Security Fundamentals Gert Del, Gert X Schawers Cisco Press, ISBN: 1587051672

Journals, Workshops Conferences

and

International Journal of Applied Cryptography (IJACT). Journal of Cryptology Springer-Verlag New York, Inc Cryptosystems Journal Tony Patti, Editor & Publisher CRYPTOLOGIA Rose-Hulman Institute of Technology The Cryptogram Journal of the American Cryptogram Association

You might also like