2019
2019
Course Description
Text Book
Computer Networks A Top-Down Approach. James F. Kurose and Keith W. Ross , 6th Edition.
Syllabus
| 1 | 2/10 | Course organization | |
| 2 | 16/10 | Definitions Security Services Security Mechanism Terminology and Background Basic Cryptographic Algorithms Classical model of encryption Modular Arithmetic | |
| 3 | 23/10 30/10 | Greatest Common Divisor(GCD). Least Common Multiple (LCM). Multiplicative Inverse The forms of Encryption | |
| 4 | 6/11 and 9/11 | Keyless Transposition Ciphers: Keyless Transposition Ciphers: Columnar Transposition Ciphers. Substitution cipher Monoalphabetic Ciphers. | |
| 7 | 23/11 | Additive Cipher Caesar Cipher Multiplicative Ciphers | |
| 5 | 2/11 and 9/11 | Affine Ciphers Polyalphabetic Ciphers Autokey Cipher Playfair Key Matrix | |
| 6 | 7/12 and 14/12 | Hill Cipher One-Time Pad | |
| 8 | -/- and -/- | Stream cipher Block ciphers Ciphers vs. Block ciphers | |
| 9 | 7/3 and 13/3 | Encryption and Decryption with Stream Ciphers Shift Register-Based Stream Ciphers Linear Feedback Shift Registers (LFSR) | |
| 10 | 21/3 | The Data Encryption Standard (DES) and Alternatives Introduction to DES | |
| 11 | 28/3 | AES | |
| 12 | 21/3 | ||
| 13 | 4/4 | ||
| 14 | 11/4 and 18/4 | ||
| 15 | | ||
| 16 |