University of Information Technology

Crypto Graphic Techniques and Data Security

Course Description

With the widespread use of computers and internet as well as the rapid spread of electronic commerce, computer security has become very important. This course introduces the main cryptographic methods for communication and computer system security.

The topics include:

  • Symmetric-Key ciphers
  • Mathematics of Cryptography
  • Data Encryption Standard
  • Advanced Encryption Standard

Intended Learning Outcomes

Upon the successful completion of this course, students should be able to:

  • have internalized the fundamental notions of threat, vulnerability, attack and countermeasure.
  • be able to identify the security goals of an information system, point out contradictory goals and suggest compromises.
  • have a theoretical understanding of the principles underlying cryptography and cryptanalysis and have a technical understanding of the main cryptographic concepts and technologies available today, including symmetric and asymmetric encryption, hashing, and digital signatures.
  • understand the purpose of security protocols and be witness to the difficulties of their verification.

Text and References Books

Textbooks:

  1. Cryptography and Network Security, McGraw-Hill International Edition, Behrouz A. Forouzan, International Edition, 2008

References:

  1. Principles of Information Security, Fourth Edition, 2012 by Michael E. Whitman, Herbert J. Mattord
  2. Johannes A. Buchman, “Introduction to Cryptography”, 2nd Edition, Springer, 2004.
  3. S.C. Coutinho, “The Mathematics of Ciphers – Number Theory and RSA Cryptography”, A.K. Peters, Natick, Massachusetts, 1998

Assessment system

Evaluation Marks Percentage
Attendance 10 Marks 10%
Tutorial/Discussion 10 Marks 10%
Project 10 Marks 10%
Assignment 10 Marks 10%
Final Examination 60 Marks 60%