Syllabus — Cryptography and Data Security
Program: M.Sc. in Network and Cybersecurity (MSNCS) Year/Part: I / I Credits: 4
Chapter 1 — Introduction to Cryptography (6 hrs)
1.1 History and evolution of cryptography 1.2 Basic cryptographic terminologies and concepts 1.3 Kerckhoff's law 1.4 Zero knowledge proof 1.5 Goals of cryptography: Confidentiality, integrity, authentication, and non-repudiation 1.6 Classical cryptography: substitution ciphers, transposition ciphers 1.7 Cryptanalysis techniques
Chapter 2 — Symmetric and Asymmetric Key Cryptography (12 hrs)
2.1 One time pad and perfect secrecy 2.2 Block Ciphers (BC) 2.3 DES, 3DES and AES 2.4 BC Modes of Operation 2.5 Stream Ciphers, RC4 2.6 Attacks on symmetric key cryptosystem and counter measures 2.7 Principles of public-key cryptography 2.8 Diffie-Hellman key exchange algorithm, security properties and vulnerabilities 2.9 RSA algorithm, key generation process, key length considerations, applications 2.10 Elliptic curve cryptography, key generation, parameter selection 2.11 Attacks on asymmetric key cryptosystems and counter measures
Chapter 3 — Cryptographic Hash Functions (8 hrs)
3.1 Definition and properties of cryptographic hash functions 3.2 Common cryptographic hash functions and comparison 3.3 Cryptanalysis of hash functions: collision attacks, length extension attacks, time-memory trade-off attacks 3.4 Applications: password hashing, digital signature, blockchain and cryptocurrency
Chapter 4 — Key Management (8 hrs)
4.1 Definition, historical context, and importance of PKI 4.2 Key components: Certificate authority, registration authority, certificate revocation list, certificate repository 4.3 Digital certificates: structure, contents, formats, certificate chains and hierarchies 4.4 PKI operations: generation, revocation, renewal 4.5 PKI trust models, standards, and protocols
Chapter 5 — Data Security (10 hrs)
5.1 Data security concepts, terminology, and principles 5.2 Data security risks, challenges, and threats 5.3 Securing data at rest and transit 5.4 Data classification and data labelling 5.5 Basic operations: obfuscation and tokenization 5.6 Data loss prevention 5.7 Mobile data security, cloud data security
Chapter 6 — Cyber Security and Data Privacy (12 hrs)
6.1 Overview of cybersecurity and data privacy 6.2 Common cyber security and data threats 6.3 Firewalls and intrusion detection systems (IDS) 6.4 General trends in data privacy, information collection, processing, storage, deletion 6.5 Privacy issues in the age of social media and big data 6.6 Overview of data privacy laws, regulations, and compliance 6.7 Consent and right to erasure 6.8 Data governance and privacy impact assessments 6.9 Introduction to Cyber Physical Systems 6.10 User Behavior Analytics 6.11 Personally Identifiable Information and Personal Health Information
Chapter 7 — Emerging Trends in Cryptography and Security (6 hrs)
7.1 Threat intelligence and predictive analytics 7.2 Overview of quantum, post-quantum, and quantum-safe cryptography 7.3 Homomorphic encryption 7.4 Overview of supply chain security 7.5 Security aspects in federated learning 7.6 Artificial intelligence and machine learning in cryptography and data security 7.7 Other emerging trends in security
References
- Cryptography and Network Security: Principles and Practice — William Stallings
- Introduction to Modern Cryptography — Jonathan Katz and Yehuda Lindell
- Computer Security: Art and Science — Matt Bishop