2019

Course Description

Text Book

Computer Networks A Top-Down Approach. James F. Kurose and Keith W. Ross , 6th Edition.

Syllabus

    
12/10Course organization 
216/10Definitions
Security Services
Security Mechanism
Terminology and Background
Basic Cryptographic Algorithms
Classical model of encryption
Modular Arithmetic
 
323/10
30/10
Greatest Common Divisor(GCD).
Least Common Multiple (LCM).
Multiplicative Inverse
The forms of Encryption
 
46/11 and 9/11Keyless Transposition Ciphers:
Keyless Transposition Ciphers:
Columnar Transposition Ciphers.
Substitution cipher
Monoalphabetic Ciphers.
 
723/11Additive Cipher
Caesar Cipher
Multiplicative Ciphers
 
52/11 and 9/11Affine Ciphers
Polyalphabetic Ciphers
Autokey Cipher
Playfair Key Matrix
 
67/12 and 14/12Hill Cipher
One-Time Pad
 
8-/- and -/-Stream cipher
Block ciphers
Ciphers vs. Block ciphers
 
97/3 and 13/3Encryption and Decryption with Stream Ciphers
Shift Register-Based Stream Ciphers
Linear Feedback Shift Registers (LFSR)
 
1021/3The Data Encryption Standard (DES) and Alternatives
Introduction to DES


1128/3AES 
1221/3  
134/4  
1411/4 and 18/4  
15   
16