MA60031: Cryptography and Network Security

Prof. Sourav Mukhopadhyay

Department of Mathematics

Indian Institute of Technology Kharagpur

 

Lecture 1

·         Introduction to Classical Cryptography

Lecture 6

·         Key Management

Lecture 2

·         Block Cipher and Stream Cipher  

  Lecture 7

·          Authentication Requirements

Lecture 3

·         Mathematical Background

 Lecture 8 

·         Attacks on Cryptosystems I

Lecture 4

·          The Advanced Encryption Standard (AES) 

Lecture 9

·           Attacks on Cryptosystems II

Lecture 5

·          Public Key Cryptography

Lecture 10

·          Secure Sockets Layer (SSL)

 

     NOTES

 

 

                              

 

 

Links to relevant web sites:

·         International Association for Cryptologic Research (IACR)

·         Wikipedia Portal on Cryptography

·         AES Homepage

·         Rijndael Homepage

·         Informative article on AES

·         Handbook of Applied Cryptography in PDF format (see other useful titles below)

 

Links to relevant files:

·         Proof of Digital Signature Standard (DSS)

·         Tutorial on Linear and Differential Cryptanalysis

 

Recommended text:

·         W. Stallings, Cryptography and Network Security - Principles and Practice. Prentice Hall, 3rd ed., 2003. ISBN 0-13-111502-2

OR

·         W. Stallings, Cryptography and Network Security - Principles and Practice. Prentice Hall, 4th ed., 2006. ISBN 0-13-187316-4

 

·         Douglas R. Stinson, Cryptography: Theory and Practice, first/second/third edition, CRC Press

 

Other useful titles:

·         A. S.  Tanenbaum, Computer Neworks. Prentice Hall, 4th ed., 2003. ISBN 0-13-038488-7

·         B. Schneier, Applied Cryptography. John Wiley & Sons, 2nd ed., 1995. ISBN 0-47-111709-9

·         C. Kaufman, R Perlman, M Speciner, Network Security: Private Communication in a Public World. Prentice Hall, 2nd ed., 2002.  ISBN 0-13-046019-2

·         A. J. Menezes, P. C. Van Oorschot, Handbook of Applied Cryptography. CRC Press, 1996.  ISBN 0-84-938523-7

·         R. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley & Sons, 2001. ISBN 0471389226

 

For some very good accounts on the history of cryptography see:

·         D. Kahn, The Codebreakers. Scribner, Rev. ed., 1996. ISBN 0-68-483130-9

·         S. Singh, The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography.  Anchor, 2000. ISBN 0385495323

 


                                                                                                           Home