M. Tech Information and Cyber Security- CBCS S. No Subject Code

Total Page:16

File Type:pdf, Size:1020Kb

M. Tech Information and Cyber Security- CBCS S. No Subject Code M. Tech Information and Cyber Security- CBCS Subject S. No CBCS R-16 L T P C Code Foundation Course 1. 2160MA103 Probability and Statistics FC 3 2 0 4 Program Core 2161IT108 Computer Oriented Optimization 2. PC 4 0 0 4 Techniques 3. 2161IT109 Modern Number Theory PC 4 0 0 4 4. 2161IT110 Foundations of Modern Networking PC 4 0 0 4 2161IT111 Hacking Techniques and Incidents 5. PC 4 0 0 4 Response 6. 2161IT112 Cloud Computing PC 4 0 0 4 7. 2161IT113 Modern Cryptography PC 4 0 0 4 8. 2161IT114 Principles of Information Security PC 3 0 0 3 9. 2161IT115 Cyber Security Principles PC 3 0 0 3 Total Credits 30 Specific Elective 10. 2162IT121 Principles of Cyber Physical Systems PE 3 0 0 3 11. 2162IT122 Intrusion Detection Systems PE 3 0 0 3 12. 2162IT123 Cyber Crimes and Laws PE 3 0 0 3 13. 2162IT124 Cyber Forensics PE 3 0 0 3 2162IT125 Bitcoin and Cryptocurrency 14. PE 3 0 0 3 Technologies Performance Evaluation of Computer 15. 2162IT126 PE 3 0 0 3 Systems 16. 2162IT127 Bio-Informatics PE 3 0 0 3 Independent Learning 17. 2163MG401 Research Methodology Independent Learning 2 18. 2163IT402 ICT Tools Independent Learning 2 19. 2163IT501 Research Seminar Independent Learning 20. 2163IT502 Field Study 2 (Anyone) 21. 2163IT801 Internship 22. 2163GE401 Business Communication Independent Learning 2 Project Work 23. 2164IT601 Project Phase 1 Project Work 10 24. 2164IT701 Project Phase 2 Project Work 16 L – Lecture; T – Tutorial; P – Practical; C – Credit COURSE CODE COURSE TITLE L T P C 2160MA102 PROBABILITY AND STATISTICS 3 2 0 4 Course Category: Foundation Course A. Preamble : To provide an in-depth knowledge about probability, sampling, Correlation and Random process B. Course Outcomes : Upon the successful completion of the course, students will be able to: Level of learning CO domain (Based on Course Outcomes Nos. revised Bloom’s taxonomy) CO1 Understanding basic concepts of probability K2 CO2 Applying basic concepts of different types of sampling K3 Applying basic concepts of Hypothesis testing and Chi-square CO3 K3 testing to solve simple problems CO4 Applying basic concepts of Correlation K3 Applying basic concepts of Random process to solve simple CO5 K3 problems C. Correlation of COs with POs : COs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 CO1 H L CO2 H H H CO3 H H M L CO4 H L M M CO5 H L H H M H- High; M-Medium; L-Low D. Course Content : UNIT I (9) Axioms of probability - Conditional probability - Total probability - Baye’s theorem - Random variable - Probability mass function - Probability density function – Properties – Moments - Moment generating function and their properties - Binomial, Poisson, Geometric, Negative binomial, Uniform, Exponential, Gamma and Weibull distribution and their properties. UNIT II (9) Sampling: different types of sampling – Sampling distribution – Sampling distribution of Mean Point Estimation of parameters: general concepts of Estimation – Unbiased estimators – Variance of a point Estimator – Standard error – Method of point estimation (method of moments – method of maximum likelihood) – Statistical intervals for a single sample: confidence interval on the mean of a normal distribution with variance known – Confidence interval on the mean of a normal distribution with variance unknown – Confidence interval on the variance and standard deviation of a normal distribution. UNIT III- TESTING OF HYPOTHESIS (9) Hypothesis testing: one sample and two sample tests for means and properties of large samples (z-test), one sample and two sample tests for means of small samples (t-test), F-test for two sample standard deviations – Chi-square test for single sample standard deviation – Chi-square tests for independence of attributes and goodness of fit. UNIT IV CORRELATION AND REGRESSION (9) Correlation – Scatter diagram – Karlpearson coefficient of correlation – calculation of the correlation coefficient for a bivariant frequency distribution – rank correlation – repeated rank – Regression – lines of regression – regression curves – regression coefficients – multiple and partial correlation – coefficient of partial correlation – generalization – multiple correlation. UNIT V RANDOM PROCESSES (9) Classification – Stationary process – Markov Process – Poisson process – Discrete parameter – Markov chain – Chapman Kolmogorov equations – Limiting distributions. Total: 45 +15(Tutorial) = 60 Periods Text Books: 1. Richard A. Johnson and C. B. Gupta, Probability and Statistics for Engineers, (7th Edn.), Pearson Education, Indian Impression – 2006 COURSE CODE COURSE TITLE L T P C COMPUTER-ORIENTED OPTIMIZATION 2161IT108 4 0 0 4 TECHNIQUES Course Category: Program Core A. Preamble : Optimization Techniques is one of the most advanced fields of computer science which involves use of Mathematics, Statistics, Management, Information Technology and Information Sciences in discovering new information and knowledge from large databases and optimize Human effort overall in Decision making process. B. Course Outcomes : Upon the successful completion of the course, students will be able to: Level of learning CO domain (Based on Course Outcomes Nos. revised Bloom’s taxonomy) Optimization problems defining, understanding and K2 CO1 classification. Formulating Linear Programming problem and similar such K3 CO2 problems into appropriate forms and problem solving. CO3 Working with Non Linear Programming problems K3 CO4 More on Non Linear Programming problems and Game Theory. K3 CO5 Queueing Theory a overview and problem solving. K3 C. Correlation of COs with POs : COs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 CO1 H L CO2 H H H CO3 H H M L CO4 H L M M CO5 H L H H M H- High; M-Medium; L-Low D. Course Content : UNIT I (9) Statement of Optimization Problem, Classification of Optimization Problems, Classical Optimization Techniques- Single Variable Optimization, Multivariable Optimization with no Constraints, with Equality Constraints, and Inequality Constraints, Convex Programming Problem. UNIT II (9) Formulation of Linear Programming, Integer Programming, 0-1 Programming and Mixed Integer Programming Problems. Solving by Computer using Graphical Method, Simplex Method, Revised Simplex Method, Transportaion Algorithm ,Karmarkar’s Method and Hungarian Method. UNIT III (9) Fundamental(2/2) - Congruence Theory , Primitive Roots and Elliptic Curve Formulation of One Dimesional Nonlinear Programming Problems related to Computer Science and Engineering; Solving by Computer Using Fibonacci Elimination Method, Quadratic Interpolation Method, and Newton Method.Formulation of Nonlinear Unconstrained Optimization Problems related to Computer Science and Engineering; Solving by Computer Using Hook-Jeeves Method and Steepest Decent (Cauchy) Methods UNIT IV PRIMALITY TESTING AND INTEGER FACTORIZATION (9) Formulation of Nonlinear Constrained Optimization, Geometric Programming, Quadratic Programming, Dynamic Programming and Stochastic Programming Problems related to Computer Science and Engineering. Game Theory – Two-person Zero-sum Game and Mixed Stategy Games; Applications of Game Theory in Computer Science and Engineering UNIT V DISCRETE LOGARITHMS (9) Basic Structure of Queueing Models, The Birth-and-Death Process, Queueing Models based on Birth- and-Death Process, Queueing Models Involing Non-exponetiual Distributiuons, A Priority-Discipline Queueing Models, Queueing Networks and Queueing Decision Models. Applications of Queueing Models in Computer Science and Engineering. Total: 45 Periods Text Books: 1. Singiresu S Rao, Engineering Optimization : Theory and Practice Third Enlarged Edition, New Age International Publishers, 2003 2. Hamdy A Taha, Operations Research- An Introduction, Ninth Edition, Pearson, 2013 3. Frederick S. Hillier and Gerald J. Lieberman, Introduction to Operations Research, Sevetrh Edition, 2002 References: 1. Articles published in reputed journals / transactions related to Computer Science and Engineering COURSE CODE COURSE TITLE L T P C 2161IT109 MODERN NUMBER THEORY 4 0 0 4 Course Category: Program Core A. Preamble : To provide an in-depth knowledge about number theory, computation theory and computational number theory in modern cryptography B. Course Outcomes : Upon the successful completion of the course, students will be able to: Level of learning CO domain (Based on Course Outcomes Nos. revised Bloom’s taxonomy) Understanding basic concepts of number theory, computation CO1 K2 theory and computational number theory in modern cryptography Applying basic concepts of elementary number theory to solve CO2 K3 simple problems Applying basic concepts of congruence theory, primitive roots CO3 K3 and elliptic curves to solve simple problems. Applying basic concepts of primality testing to solve simple CO4 K3 problems Applying basic concepts of integer factorization to solve simple CO5 K3 problems Applying basic concepts of discrete logarithms to solve simple CO6 K3 problems C. Correlation of COs with POs : COs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 CO1 H L CO2 H H CO3 H M L L CO4 H M M L CO5 H L H H M H- High; M-Medium; L-Low D. Course Content : UNIT I INTRODUCTION TO CRYPTOGRAPHY (9) Introduction - Number Theory, Computation Theory, Computational Number Theory and Modern Cryptography. Secret-Key Cryptography - Cryptography and Cryptanalysis, Classic Secret-Key and Modern Secret-Key Cryptography. UNIT II FUNDAMENTALS OF NUMBER THEORY (9) Fundamental(1/2) - Basic Algebraic Structures, Divisibility Theory and Arithmetic Functions. UNIT III CONGRUENCE THEORM (9) Fundamental(2/2) - Congruence Theory
Recommended publications
  • Foreword by Whitfield Diffie Preface About the Author Chapter 1
    Applied Cryptography: Second Edition - Bruce Schneier Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C by Bruce Schneier Wiley Computer Publishing, John Wiley & Sons, Inc. ISBN: 0471128457 Pub Date: 01/01/96 Foreword By Whitfield Diffie Preface About the Author Chapter 1—Foundations 1.1 Terminology 1.2 Steganography 1.3 Substitution Ciphers and Transposition Ciphers 1.4 Simple XOR 1.5 One-Time Pads 1.6 Computer Algorithms 1.7 Large Numbers Part I—Cryptographic Protocols Chapter 2—Protocol Building Blocks 2.1 Introduction to Protocols 2.2 Communications Using Symmetric Cryptography 2.3 One-Way Functions 2.4 One-Way Hash Functions 2.5 Communications Using Public-Key Cryptography 2.6 Digital Signatures 2.7 Digital Signatures with Encryption 2.8 Random and Pseudo-Random-Sequence Generation Chapter 3—Basic Protocols 3.1 Key Exchange 3.2 Authentication 3.3 Authentication and Key Exchange 3.4 Formal Analysis of Authentication and Key-Exchange Protocols 3.5 Multiple-Key Public-Key Cryptography 3.6 Secret Splitting 3.7 Secret Sharing 3.8 Cryptographic Protection of Databases Chapter 4—Intermediate Protocols 4.1 Timestamping Services 4.2 Subliminal Channel 4.3 Undeniable Digital Signatures 4.4 Designated Confirmer Signatures 4.5 Proxy Signatures 4.6 Group Signatures 4.7 Fail-Stop Digital Signatures 4.8 Computing with Encrypted Data 4.9 Bit Commitment 4.10 Fair Coin Flips 4.11 Mental Poker 4.12 One-Way Accumulators 4.13 All-or-Nothing Disclosure of Secrets Page 1 of 666 Applied Cryptography: Second Edition - Bruce
    [Show full text]
  • COURSE CODE COURSE TITLE L T P C 2161CS127 CYBER SECURITY PRINCIPLES 3 0 0 3 Course Category: Program Core A
    COURSE CODE COURSE TITLE L T P C 2161CS127 CYBER SECURITY PRINCIPLES 3 0 0 3 Course Category: Program Core A. Preamble : This course describes the concepts of network security and cyber security principles. B. Course Outcomes : Upon the successful completion of the course, students will be able to: Level of learning CO domain (Based on Course Outcomes Nos. revised Bloom’s taxonomy) CO1 Compare and contrast various cryptographic protocols K2 CO2 Demonstrate various ethical hacking and system hacking K3 CO3 Explain the various cyber threats and vulnerabilities. K2 Discuss the pseudo random sequence generators and stream CO4 K2 ciphers CO5 Design and implement secure applications K2 C. Correlation of COs with POs : COs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 CO1 H L CO2 H H CO3 L L L CO4 M L M M CO5 M M H M H- High; M-Medium; L-Low D. Course Content : UNIT I Cryptographic Protocols (9) Introduction to Protocols-Communications Using Symmetric Cryptography-One-Way Functions- One-Way Hash Functions-Communications Using Public-Key Cryptography-Digital Signatures- Digital Signatures with Encryption-Random and Pseudo-Random-Sequence Generation-Basic Protocols-Key Exchange-Authentication-Authentication and Key Exchange. UNIT II Ethical Hacking and System Hacking (9) Introduction-Importance of Security-Elements of Security-Phase of an Attack- Hacker Attacks – Hacktivism –Ethical Hackers –Computer Crimes and Implication. Introduction–Cracking password–Password cracking websites–Password guessing Algorithms–Password cracking Tools Countermeasure–Escalating Privileges-Executing Applications –Key loggers and spywares. UNIT III Cyber Threats and Vulnerabilities (9) Cyber Threats-Cyber Activism-Cybercrime-Cyber Espionage-Cyber terrorism-Cyber Warfare- Cyber World Vulnerabilities-Cyber Operations-Cyber Weaponry-Society’s Critical Structures as Targets.
    [Show full text]
  • Two Dozen Short Lessons in Haskell a Participatory Textbook on Functional Programming
    Two Dozen Short Lessons in Haskell a participatory textbook on functional programming by Rex Page School of Computer Science University of Oklahoma Copyright © 1995, 1996, 1997 by Rex Page Permission to copy and use this document for educational or research purposes of a non-commercial nature is hereby granted, provided that this copyright notice is retained on all copies. All other rights reserved by author. Rex Page School of Computer Science University of Oklahoma 200 Felgar Street — EL114 Norman OK 73019 USA [email protected] Table of Contents 1.................................................................................................. How To Use This Book 5.................................................................................................... Hello World, Etc. 1 10..............................................................................................................Definitions 2 14...............................................................................How to Run Haskell Programs 3 17......................................... Computations on Sequences — List Comprehensions 4 21...................................................................... Function Composition and Currying 5 25.......................... Patterns of Computation — Composition, Folding, and Mapping 6 33......................................................................................................................Types 7 37........................................................ Function Types, Classes, and Polymorphism 8 42...........................................
    [Show full text]
  • Cryptography
    University of Indonesia Magister of Information Technology Cryptography Arrianto Mukti Wibowo University of Indonesia – University of Budi Luhur Magister of Information Technology Tujuan • Mempelajari berbagai metode dan teknik penyembunyian data menggunakan kriptografi. University of Indonesia – University of Budi Luhur Magister of Information Technology Topik • Symmetric & asymmetric cryptography, key strength, cryptosystems, public key infrastructure (PKI), one-way function, hash function, key management, cryptographic attacks University of Indonesia – University of Budi Luhur Magister of Information Technology Cryptography Issues (Schneier ‟96) • Kerahasiaan (confidentiality) dijamin dengan melakukan enkripsi (penyandian). • Keutuhan (integrity) atas data-data pembayaran dilakukan dengan fungsi hash satu arah. • Jaminan atas identitas dan keabsahan (authenticity) pihak-pihak yang melakukan transaksi dilakukan dengan menggunakan password atau sertifikat digital. Sedangkan keotentikan data transaksi dapat dilakukan dengan tanda tangan digital. • Transaksi dapat dijadikan barang bukti yang tidak bisa disangkal (non-repudiation) dengan memanfaatkan tanda tangan digital dan sertifikat digital. University of Indonesia – University of Budi Luhur Magister of Information Technology Makna Kriptografi • Krupto + Grafh = secret + writing • Cryptography: ilmu untuk membuat sebuah pesan menjadi aman University of Indonesia – University of Budi Luhur Magister of Information Technology Cryptographic algorithm & key • Cipher: fungsi matematika yang
    [Show full text]
  • The GCHQ Protocol and Its Problems
    The GCHQ Protocol and Its Problems Ross Anderson, Michael Roe Cambridge University Computer Laboratory Pembroke Street, Cambridge CB2 3QG Email: (rjal4,mrr)@cl. cam.ac .uk Abstract. The UK government is fielding an architecture for secure electronic mail based on the NSA’s Message Security Protocol, with a key escrow scheme inspired by Diffie-Hellman. Attempts have been made to have this protocol adopted by other governments and in various do- mestic applications. The declared policy goal is to entrench commercial key escrow while simultaneously creating a large enough market that software houses will support the protocol as a standard feature rather than charging extra for it. We describe this protocol and show that, like the ‘Clipper’ proposal of a few years ago, it has a number of problems. It provides the worst of both secret and public key systems, without delivering the advantages of ei- ther; it does not support nonrepudiation; a.nd there are serious problems with the replacement of compromised keys, the protection of security la- bels, and the support of complex or dynamic administrative structures. 1 Introduction Over the last two years, the British government’s crypto policy has changed completely. Whereas in 1994 the Primc Minister assured the House of Com- mons that no further restrictions on encryption were envisaged, we now find the government proposing to introduce a licensing scheme for ‘trusted third par- ties’, and licenses will only be granted to operators that escrow their customers’ confidentiality keys to the government’s satisfaction [ll,211. In March 1996, a document describing the cryptographic protocols to he used in government electronic mail systems was issued by CESG, the department of GCHQ concerned with the protection of government information; it has since been made available on the worldwide web [4].
    [Show full text]
  • Confidentiality Framework
    T/3522TL/2778/9 4 February 1997 CESG INFOSEC MEMORANDUM NO. 14 AN HMG PUBLIC KEY INFRASTRUCTURE TO SUPPORT CONFIDENTIALITY Issue 1.0 CESG ELECTRONIC INFORMATION SYSTEMS SECURITY MEMORANDUM NO. 14 AN HMG PUBLIC KEY INFRASTRUCTURE TO SUPPORT CONFIDENTIALITY Issue 1.0 February 1997 © Crown Copyright 1997 Communications-Electronics Security Group CESG Infosec Memorandum No. 14 FOREWORD This Memorandum is issued by the Communications-Electronics Security Group (CESG) of Government Communications Headquarters as part of its responsibility to advise HMG on Electronic Information Systems Security (Infosec). It suggests an architecture for a public key infrastructure (PKI) to support confidentiality between communicating systems. The Memorandum will eventually form part of a suite of documents which collectively provide advice on the implementation of a PKI, and the use of the services enabled by such an infrastructure (e.g. electronic mail). The architecture as described in this document is an initial attempt at defining a PKI, and CESG will take into account any comments on its feasibility. This Memorandum is intended for use by HMG, its contractors and suppliers. General correspondence in connection with this document, including requests for additional copies, should be addressed to: Communications-Electronics Security Group (X13) Government Communications Headquarters PO Box 144 Cheltenham GL52 5UE United Kingdom Technical correspondence in connection with this document should be sent to T27 at the above address. page ii Issue 1.0 February
    [Show full text]
  • APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C:Table of Contents
    To access the contents, click the chapter and section titles. Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth) (Publisher: John Wiley & Sons, Inc.) Author(s): Bruce Schneier ISBN: 0471128457 Publication Date: 01/01/96 Brief Full Advanced Search Search Tips Search this book: Foreword by Whitfield Diffie Preface About the Author Chapter 1—Foundations 1.1 Terminology 1.2 Steganography 1.3 Substitution Ciphers and Transposition Ciphers 1.4 Simple XOR 1.5 One-Time Pads 1.6 Computer Algorithms 1.7 Large Numbers Part I—Cryptographic Protocols Chapter 2—Protocol Building Blocks 2.1 Introduction to Protocols 2.2 Communications Using Symmetric Cryptography 2.3 One-Way Functions 2.4 One-Way Hash Functions 2.5 Communications Using Public-Key Cryptography 2.6 Digital Signatures 2.7 Digital Signatures with Encryption 2.8 Random and Pseudo-Random-Sequence Generation Chapter 3—Basic Protocols 3.1 Key Exchange 3.2 Authentication 3.3 Authentication and Key Exchange 3.4 Formal Analysis of Authentication and Key-Exchange Protocols 3.5 Multiple-Key Public-Key Cryptography 3.6 Secret Splitting 3.7 Secret Sharing 3.8 Cryptographic Protection of Databases Chapter 4—Intermediate Protocols 4.1 Timestamping Services 4.2 Subliminal Channel 4.3 Undeniable Digital Signatures 4.4 Designated Confirmer Signatures 4.5 Proxy Signatures 4.6 Group Signatures 4.7 Fail-Stop Digital Signatures 4.8 Computing with Encrypted Data 4.9 Bit Commitment 4.10 Fair Coin Flips 4.11 Mental Poker 4.12 One-Way Accumulators 4.13 All-or-Nothing Disclosure
    [Show full text]
  • Applied Cryptography, Second Edition
    To access the contents, click the chapter and section titles. Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth) (Publisher: John Wiley & Sons, Inc.) Author(s): Bruce Schneier ISBN: 0471128457 Publication Date: 01/01/96 Brief Full Advanced Search Search Tips Search this book: Foreword by Whitfield Diffie Preface About the Author Chapter 1—Foundations 1.1 Terminology 1.2 Steganography 1.3 Substitution Ciphers and Transposition Ciphers 1.4 Simple XOR 1.5 One-Time Pads 1.6 Computer Algorithms 1.7 Large Numbers Part I—Cryptographic Protocols Chapter 2—Protocol Building Blocks 2.1 Introduction to Protocols 2.2 Communications Using Symmetric Cryptography 2.3 One-Way Functions 2.4 One-Way Hash Functions 2.5 Communications Using Public-Key Cryptography 2.6 Digital Signatures 2.7 Digital Signatures with Encryption 2.8 Random and Pseudo-Random-Sequence Generation Chapter 3—Basic Protocols 3.1 Key Exchange 3.2 Authentication 3.3 Authentication and Key Exchange 3.4 Formal Analysis of Authentication and Key-Exchange Protocols 3.5 Multiple-Key Public-Key Cryptography 3.6 Secret Splitting 3.7 Secret Sharing 3.8 Cryptographic Protection of Databases Chapter 4—Intermediate Protocols 4.1 Timestamping Services 4.2 Subliminal Channel 4.3 Undeniable Digital Signatures 4.4 Designated Confirmer Signatures 4.5 Proxy Signatures 4.6 Group Signatures 4.7 Fail-Stop Digital Signatures 4.8 Computing with Encrypted Data 4.9 Bit Commitment 4.10 Fair Coin Flips 4.11 Mental Poker 4.12 One-Way Accumulators 4.13 All-or-Nothing Disclosure
    [Show full text]
  • APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols
    To access the contents, click the chapter and section titles. Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth) (Publisher: John Wiley & Sons, Inc.) Author(s): Bruce Schneier ISBN: 0471128457 Publication Date: 01/01/96 Brief Full Advanced Search Search Tips Search this book: Foreword by Whitfield Diffie Preface About the Author Chapter 1—Foundations 1.1 Terminology 1.2 Steganography 1.3 Substitution Ciphers and Transposition Ciphers 1.4 Simple XOR 1.5 One-Time Pads 1.6 Computer Algorithms 1.7 Large Numbers Part I—Cryptographic Protocols Chapter 2—Protocol Building Blocks 2.1 Introduction to Protocols 2.2 Communications Using Symmetric Cryptography 2.3 One-Way Functions 2.4 One-Way Hash Functions 2.5 Communications Using Public-Key Cryptography 2.6 Digital Signatures 2.7 Digital Signatures with Encryption 2.8 Random and Pseudo-Random-Sequence Generation Chapter 3—Basic Protocols 3.1 Key Exchange 3.2 Authentication 3.3 Authentication and Key Exchange 3.4 Formal Analysis of Authentication and Key-Exchange Protocols 3.5 Multiple-Key Public-Key Cryptography 3.6 Secret Splitting 3.7 Secret Sharing 3.8 Cryptographic Protection of Databases Chapter 4—Intermediate Protocols 4.1 Timestamping Services 4.2 Subliminal Channel 4.3 Undeniable Digital Signatures 4.4 Designated Confirmer Signatures 4.5 Proxy Signatures 4.6 Group Signatures 4.7 Fail-Stop Digital Signatures 4.8 Computing with Encrypted Data 4.9 Bit Commitment 4.10 Fair Coin Flips 4.11 Mental Poker 4.12 One-Way Accumulators 4.13 All-or-Nothing Disclosure
    [Show full text]
  • Security Engineering 0011 0010 1010 1101 0001 0100 1011 Lesson 10 Combining Block Ciphers; Pseudo-Random- Sequence Generators and Stream Ciphers
    Security Engineering 0011 0010 1010 1101 0001 0100 1011 Lesson 10 Combining Block Ciphers; Pseudo-Random- Sequence Generators and Stream Ciphers, Spring 2010 Dr. Marenglen Biba Combining Block Ciphers Combining Block Ciphers Double Encryption Triple Encryption Doubling the Block Length Other Multiple Encryption Schemes CDMF Key Shortening 0011 0010 1010 1101 0001 0100 1011 Whitening Cascading Multiple Block Algorithms Combining Multiple Block Algorithms Combining block algorithms • There are many ways to combine block algorithms to get new algorithms. • The idea behind these schemes is to try to increase security without going through the trouble of designing a new algorithm. 0011 0010• DES 1010 has1101 been 0001 0100a secure 1011 algorithm However, the key is too short. • Wouldn’t it be nice to use DES as a building block for another algorithm with a longer key? • We’d have the best of both worlds: the assurance of almost four decades of cryptanalysis plus a long key. Multiple encryption • Multiple encryption is one combination technique: using an algorithm to encrypt the same plaintext block multiple times with multiple keys. • Cascading is like multiple encryption, but uses different algorithms. • Encrypting a plaintext block twice with the same key, 0011 0010whether 1010 1101 with 0001 the 0100 same 1011 algorithm or a different one, is not smart. – For the same algorithm, it does not affect the complexity of a brute-force search. • If you are going to use any of the following techniques, make sure the multiple keys are different and independent. Double Encryption • A naìve way of improving the security of a block algorithm is to encrypt a block twice with two different keys.
    [Show full text]
  • The GCHQ Protocol and Its Problems
    The GCHQ Protocol and its Problems Ross Anderson, Michael Roe Cambridge University Computer Laboratory Pembroke Street, Cambridge CB2 3QG Email: (rja14,mrr)@cl.cam.ac.uk Abstract. The UK government is fielding an architecture for secure electronic mail based on the NSA’s Message Security Protocol, with a key escrow scheme inspired by Diffie-Hellman. Attempts have been made to have this protocol adopted by other governments and in various do- mestic applications. The declared policy goal is to entrench commercial key escrow while simultaneously creating a large enough market that software houses will support the protocol as a standard feature rather than charging extra for it. We describe this protocol and show that, like the ‘Clipper’ proposal of a few years ago, it has a number of problems. It provides the worst of both secret and public key systems, without delivering the advantages of ei- ther; it does not support nonrepudiation; and there are serious problems with the replacement of compromised keys, the protection of security la- bels, and the support of complex or dynamic administrative structures. 1 Introduction Over the last two years, the British government’s crypto policy has changed completely. Whereas in 1994 the Prime Minister assured the House of Com- mons that no further restrictions on encryption were envisaged, we now find the government proposing to introduce a licensing scheme for ‘trusted third par- ties’, and licenses will only be granted to operators that escrow their customers’ confidentiality keys to the government’s satisfaction [11, ?]. In March 1996, a document describing the cryptographic protocols to be used in government electronic mail systems was issued by CESG, the department of GCHQ concerned with the protection of government information; it has since been made available on the worldwide web [4].
    [Show full text]
  • SRINIVAS UNIVERSITY COLLEGE of ENGINEERING and TECHNOLOGY Electronics and Communication Engineering
    SRINIVAS UNIVERSITY COLLEGE OF ENGINEERING AND TECHNOLOGY Electronics and Communication Engineering Scheme and the Subjects of Ph.D. Course Work Sl.No Subject Code Subject Title Credits Marks 1 18PHDRM Research Methodology 4 100 2 20SPHDEC01 Advanced Embedded System 4 100 3 20SPHDEC02 Automotive Electronics 4 100 4 20SPHDEC03 Cryptography And Network Security 4 100 Total 400 Scheme of Examination Continuous Internal Assessment: 1. Department level presentations (2): 15 + 15 = 50 Marks 30, (30 + 20 = 50) 2. Assignments (1): 20. End Semester Examination: 50 One question from each module with internal Marks choice. Each question carries 10 marks. (5 x 10 = 50) ADVANCED EMBEDDED SYSTEM 20SPHDEC01 Module -1 Embedded System: Embedded vs General computing system, classification, application and purpose of ES. Core of an Embedded System, Memory, Sensors, Actuators, LED, Optocoupler, Communication Interface, Reset circuits, RTC, WDT, Characteristics and Quality Attributes of Embedded Systems (Selected Topics from Ch -1, 2, 3 of Text 1). Module -2 Hardware Software Co-Design, embedded firmware design approaches, computational models, embedded firmware development languages, Integration and testing of Embedded Hardware and firmware, Components in embedded system development environment (IDE), Files generated during compilation, simulators, emulators and debugging (Selected Topics From Ch-7, 9, 12, 13 of Text 1). Module -3 ARM-32 bit Microcontroller: Thumb-2 technology and applications of ARM, Architecture of ARM Cortex M3, Various Units in the architecture, General Purpose Registers, Special Registers, exceptions, interrupts, stack operation, reset sequence (Ch 1, 2, 3 of Text 2). Module -4 Instruction Sets: Assembly basics, Instruction list and description, useful instructions, Memory Systems, Memory maps, Cortex M3 implementation overview, pipeline and bus interface (Ch-4, 5, 6 of Text 2).
    [Show full text]