Skip to main content

Syllabus — Cryptography and Data Security

Program: M.Sc. in Network and Cybersecurity (MSNCS) Year/Part: I / I Credits: 4

Chapter 1 — Introduction to Cryptography (6 hrs)

1.1 History and evolution of cryptography 1.2 Basic cryptographic terminologies and concepts 1.3 Kerckhoff's law 1.4 Zero knowledge proof 1.5 Goals of cryptography: Confidentiality, integrity, authentication, and non-repudiation 1.6 Classical cryptography: substitution ciphers, transposition ciphers 1.7 Cryptanalysis techniques

Chapter 2 — Symmetric and Asymmetric Key Cryptography (12 hrs)

2.1 One time pad and perfect secrecy 2.2 Block Ciphers (BC) 2.3 DES, 3DES and AES 2.4 BC Modes of Operation 2.5 Stream Ciphers, RC4 2.6 Attacks on symmetric key cryptosystem and counter measures 2.7 Principles of public-key cryptography 2.8 Diffie-Hellman key exchange algorithm, security properties and vulnerabilities 2.9 RSA algorithm, key generation process, key length considerations, applications 2.10 Elliptic curve cryptography, key generation, parameter selection 2.11 Attacks on asymmetric key cryptosystems and counter measures

Chapter 3 — Cryptographic Hash Functions (8 hrs)

3.1 Definition and properties of cryptographic hash functions 3.2 Common cryptographic hash functions and comparison 3.3 Cryptanalysis of hash functions: collision attacks, length extension attacks, time-memory trade-off attacks 3.4 Applications: password hashing, digital signature, blockchain and cryptocurrency

Chapter 4 — Key Management (8 hrs)

4.1 Definition, historical context, and importance of PKI 4.2 Key components: Certificate authority, registration authority, certificate revocation list, certificate repository 4.3 Digital certificates: structure, contents, formats, certificate chains and hierarchies 4.4 PKI operations: generation, revocation, renewal 4.5 PKI trust models, standards, and protocols

Chapter 5 — Data Security (10 hrs)

5.1 Data security concepts, terminology, and principles 5.2 Data security risks, challenges, and threats 5.3 Securing data at rest and transit 5.4 Data classification and data labelling 5.5 Basic operations: obfuscation and tokenization 5.6 Data loss prevention 5.7 Mobile data security, cloud data security

Chapter 6 — Cyber Security and Data Privacy (12 hrs)

6.1 Overview of cybersecurity and data privacy 6.2 Common cyber security and data threats 6.3 Firewalls and intrusion detection systems (IDS) 6.4 General trends in data privacy, information collection, processing, storage, deletion 6.5 Privacy issues in the age of social media and big data 6.6 Overview of data privacy laws, regulations, and compliance 6.7 Consent and right to erasure 6.8 Data governance and privacy impact assessments 6.9 Introduction to Cyber Physical Systems 6.10 User Behavior Analytics 6.11 Personally Identifiable Information and Personal Health Information

7.1 Threat intelligence and predictive analytics 7.2 Overview of quantum, post-quantum, and quantum-safe cryptography 7.3 Homomorphic encryption 7.4 Overview of supply chain security 7.5 Security aspects in federated learning 7.6 Artificial intelligence and machine learning in cryptography and data security 7.7 Other emerging trends in security

References

  1. Cryptography and Network Security: Principles and Practice — William Stallings
  2. Introduction to Modern Cryptography — Jonathan Katz and Yehuda Lindell
  3. Computer Security: Art and Science — Matt Bishop
· min read