Course Name: 

Modern Cryptography (IT913)



Credits (L-T-P): 



Classical Encryption Techniques and their Cryptanalysis : Symmetric cipher models Symmetric-Key Encryption Schemes: Data Encryption Standard and Advanced Encryption
Standards, RC4, Attacks on DES, AES. Number Theory: Prime numbers and factorin, modular arithmetic, computations in finite fields, Discrete logarithms. Public-Key (Asymmetric) Cryptography. Hash Functions: Design of Collision-Resistant Hash Functions, Popular Uses of Collision-Resistant Hash Functions, Random Oracle Model. Hash
algorithms: MD5, SHA-256. Message Authentication: Message Authentication Codes Definitions, Constructions of Secure Message Authenticate Codes, Practical Constructions of
Message Authentication Codes. Digital Signatures and Applications


William Stallings, “Cryptography & Network Security” 4 th Edition, 2006, Pearson Education Asia.
Schiner Bruce, “Applied Cryptology” John Wiley & Sons, 2001.
Wade Trappe & Lawrence C Washington, “Introduction to Cryptography with Coding Theory” New Jersey, Pearson Education, 2006.
Kahate A, “Cryptography & Network Security”, Tata Mc Graw Hill, 2004.
Charlie Kaufman, Radia Perlman and Mike Speciner, “Network Security: Private Communication in a Public World”, Prentice Hall of India Private Limited.
Behrouz A. Forouzan, “Cryptography and Network Security”, Mc Graw Hill.
Jonathan Katz and Lindell, “Introduction to Modern Cryptography: Principles and Protocols”, Chapman and Hall/CRC.
Jonathan Katz and Yehuda Lindell, "Introduction to Modern Cryptography", CRC Press.
A. Menezes, P. Van Oorschot and S. Vanstone, "Handbook of Applied Cryptography", CRC Press, 1996.


Information Technology

Contact us

G. Ram Mohana Reddy

Professor and Head,
Department of Information Technology, NITK, Surathkal,
P. O. Srinivasnagar, Mangalore - 575 025
Karnataka, India.
Ph.:    +91-824-2474056
Email:  infotech[AT]nitk[DOT]ac[DOT]in

Sowmya Kamath S (Web Admin)

Connect with us

We're on Social Networks. Follow us & stay in touch.