Recommended Book(s)

  • Cryptography And Network Security
    (William Stallings) 4th / 5th Edition

Reference Book(s)

  • An Introduction To Mathematical Cryptography
    (J. Hoffstein, Pipher, Silverman) Springer

  • A Handbook Of Applied Cryptography
    J Menezes, Paul C. Van Oorschot, Scott A. Vanstone
  • Applied Cryptography 
    (Bruce Schneier)


The focus of this course will be on how the cryptographic techniques and protocols can be used to can be used to secure the most valuable asset ‘information’ when it is transmitted electronically over a public network.


After completing this course, students will be able to
•    Understand meaning of cryptography and cryptanalysis
•    Learn mathematical concepts in number theory, algebra and complexity theory that are applied to modern cryptographic algorithms
•    Explain various cryptographic methods like Private Key Encryption, Public Key Encryption, Hash Functions, Digital Signatures, Pseudo Random Numbers, Key Management, Message Authentication etc.


  • Introduction and Motivation, Cryptography and Cryptanalysis
  • Classical Encryption Methods
    • Number theory, Modular Arithmetic
  • Block Cipher, DES
  • Finite Fields
  • Private Key Encryption Methods, AES, Triple DES, RC4
  • Key Management, Confidentiality using Symmetric Keys
  • Prime Numbers, Primality Test
  • Public Key Encryption Methods, RSA
  • Discrete Logarithm Problem, ElGamal Cryptosystem
  • Hash Functions, Digital Signatures, Authentication Protocols
  • Elliptic Curve Cryptography
  • NP-Hard Problems, Algebraic Cryptography, an overview