0% found this document useful (0 votes)
56 views12 pages

Course Name Course Code No of Credits Degree Level Time Allocation

This document outlines a course on applied cryptography. It includes: - The course name, code, credits, level, time allocation and prerequisite. - 10 learning outcomes covering key cryptography concepts like encryption techniques, cryptosystems, hash functions, and digital signatures. - Student tasks like attending lectures, completing assignments, and accessing online materials. - A 11-session course schedule addressing topics like classical encryption, block ciphers, the Data Encryption Standard, and the Advanced Encryption Standard. - References, tools, assessment structure consisting of tests, labs, participation, and a final exam.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLS, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views12 pages

Course Name Course Code No of Credits Degree Level Time Allocation

This document outlines a course on applied cryptography. It includes: - The course name, code, credits, level, time allocation and prerequisite. - 10 learning outcomes covering key cryptography concepts like encryption techniques, cryptosystems, hash functions, and digital signatures. - Student tasks like attending lectures, completing assignments, and accessing online materials. - A 11-session course schedule addressing topics like classical encryption, block ciphers, the Data Encryption Standard, and the Advanced Encryption Standard. - References, tools, assessment structure consisting of tests, labs, participation, and a final exam.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLS, PDF, TXT or read online on Scribd
You are on page 1/ 12

Course Name

1
Tên môn học
Course Code
2
Mã môn học
No of credits
3
Số tín chỉ
Degree Level
4
Cấp độ
Time Allocation
5 Phân bố giờ học

Pre-requisite
6 Điều kiện tiên quyết

Description
Mô tả

Learning Outcomes
Đầu ra
LO1

LO2

LO3

LO4

LO5

LO6

LO7

LO8

LO9

LO10

8 Student's tasks
Nhiệm vụ của sinh viên

02.01a-BM/CT/HDCV/FE 1/1
Teaching & Learning
Materials
Tài liệu học tập &
giảng dạy

Assessment
structure
Cấu trúc đánh giá
10

Scoring scale
11 Thang điểm

02.01a-BM/CT/HDCV/FE 1/1
SYLLABUS/ ĐỀ CƯƠNG CHI TIẾT
(Under Decision No. 841/QĐ-ĐHFPT dated 21/08/2017)

Introduction to Applied Cryptography

CRY302

Bachelor level
30 sessions; 1 session = 90'
Lectures: 12; Tutorials/Lab: 18

MAD101

This course is an introduction to applied cryptography and its relationship to secure systems.
Students will learn making, breaking codes and ciphers. They can have a good understanding
of major concepts in applied cryptography: plain text, encryption, cipher text, block ciphers,
decryption, public-key cryptosystems, hash functions, digital signatures, authentication, key
management, and cryptographic protocols as a part of securing digital systems.

Upon the completion of this course, students will be able to

Describe the key security requirements of confidentiality, integrity, availability, and different
types of security threats and attacks.
Understand the main concepts of symmetric cryptography via classical symmetric (Caesar-type,
Hill, Vigenère, Vernam, …) ciphers.
Understand the main concepts of modern symmetric cryptography (stream, block, Feistel-type
ciphers, DES).
Understand the general structure of Advanced Encryption Standard (AES) and the four
transformations used in AES.
Analyze the security of multiple encryption schemes and explain the meet-in-the-middle attack.

Understand requirements for pseudorandom number generators and how they can be
constructed by using block cipher.
Understand the basic principles of public-key cryptosystems (RSA, ElGamal, Diffie-Hellman)

Understand the basic structure of cryptographic hash functions.

Understand the basic principles of message authentication and requirements.

Understand the basic digital signature schemes and algorithms (Elgamal, RSA-PSS).

Students must attend more than 80% of contact sessions in order to be accepted to the final
examination.
- Students are responsible to do all exercises, assignments and labs given by instructor in class
or at home and submit on time
- Use laptop in class only for learning purpose
- Promptly access to the http://cms.fpt.edu.vn for up-to-date course information

02.01a-BM/CT/HDCV/FE 1/1
a) Main textbooks/resources:
1. William Stallings, “Cryptography and Network Security: Principles and Practice”, 6th Ed.
Pearson, 2013 (cf. other materials from http://williamstallings.com/)

b) Reference books/resources (pdf included):


2. Nigel Smart, “Cryptography Made Simple”, Springer, 2016.
3. Alasdair McAndrew, “Introduction to Cryptography with Open-Source Software”, CRC Press,
2011.
4. Bruce Schneier, “Applied Cryptography: Protocols, Algorithms and Source Code in C”, 20th
Anniversary Edition, John Wiley & Sons, 2015.
5. Keith Martin, “Everyday Cryptography: Fundamental Principles and Applications”, Oxford
University Press, 2012.
6. Lecture slides, Lab manual, supplementary material

c) Tools: Internet, Cryptool, Sage, OpenSSL, Maple

a) Ongoing assessment (OA):


02 Progress Tests: 20%
Participation in discussions: 10%
10 Labs 30%
b) Final exam: 40%
c) Completion criteria: Every on-going assessment component >0, Average Lab Score >= 4,
Final Exam Score >=4 & Final Result >=5

10

02.01a-BM/CT/HDCV/FE 1/1
Back to Syllabus COURSE SCHEDULE/ LỊCH TRÌNH MÔN HỌC

Learning
Outcomes
Sessio
Đầu ra
n Topic/ Sub-topics ITU level Materials Activitiy
(đảm bảo
Buổi Chủ đề chính/ chủ đề con Mức ITU Tài liệu Hoạt động dạy và học
mỗi LO tối
học
thiểu 1 lần
T hoặc U)

Introduction to the course


I
1 Chapter 1. Overview
T
1.1 Computer Security Concepts Introduce course, teaching and
learning materials, tools;
1.2 The OSI Security Architecture Syllabus, Textbook, Lab Manual, Slides
Explain main security concepts
2 1.3 Security Attacks LO1 T Textbook Chapter 1
1.4 Security Services Chapter slides
Study and Review Chapter 1
1.5 Security Mechanisms
3 1.6 A Model for Network Security T
1.8 Review Questions, Problems

Chapter 2. Classical Encryption Techniques


2.1 Symmetric Cipher Model
4 T
2.2 Substitution Techniques Explain Classical Encryption
2.3 Transposition Techniques Textbook Chapter 2 Techniques
Chapter slides
2.4 Rotor Machines LO2 Study and Review Chapter 2
5 2.5 Steganography T
2.7 Review Questions, Problems

Guide,
6 Lab 1: Classical symmetric cipher U Chapter slides; Lab Manual
Practice and Review Lab 1

02.01a-BM/CT/HDCV/FE 1/1
Chapter 3. Block Ciphers and the DES
3.1 Traditional Block Cipher Structure T Explain Block Ciphers and the
3.2 The Data Encryption Standard (DES) DES
Textbook Chapter 3
7 3.4 The Strength of DES
Chapter slides
3.5 Block Cipher Design Principles LO3 Study and Review Chapter 3
Recommended Reading 1: Chapter 4. Finite I Read recommended document
Fields Arithmetic

Guide,
8 Lab 2: DES U Chapter slides; Lab Manual
Practice and Review Lab 2

Review Chapters 1, 2, 3 (Guiding Problems) Review question and problems in


9 LO1, 2, 3 Textbook Chapter 1, 2, 3 and slides
Progress Test 1 (30’) – Chapters 1, 2, 3 Chapter 1, 2, 3

Chapter 5. Advanced Encryption Standard


5.2 AES Structure Explain Advanced Encryption
10 T
5.3 AES Transformation Functions Textbook Chapter 5 Standard
5.4 AES Key Expansion Chapter slides
LO4 Study and Review Chapter 5
5.6 AES Implementation
11 U
5.8 Review Questions, and Problems
Lab 3: Polynomials with Coefficients in GF(2^8), Guide,
12 U Chapter slides; Lab Manual
Simplified AES Practice and Review Lab 3

Chapter 6. Block Cipher Operation


6.1 Multiple Encryption and Triple DES
13 6.2 Electronic Code Book T
6.3 Cipher Block Chaining Mode
6.4 Cipher Feedback Mode Explain Block Cipher Operation
Textbook Chapter 6
Chapter slides
6.5 Output Feedback Mode LO5 Study and Review Chapter 6
6.6 Counter Mode
14 6.7 XTS-AES Mode for Block-Oriented Storage TU
Devices
6.9 Review Questions, and Problems

Guide,
15 Lab 4: Block Cipher Operation, 3DES U Chapter slides; Lab Manual
Practice and Review Lab 4

Chapter 7. Pseudorandom Number Generation


(PRNG) and Stream Ciphers
7.1 Principles of PRNG
16 T Explain about PRNG and Stream
7.2 Pseudorandom Number Generators
7.3 PRNG Using a Block Cipher Textbook Chapter 7 Ciphers
7.4 Stream Ciphers Chapter slides
LO6 Study and Review Chapter 7
7.5 RC4
17 7.6 True Random Number Generators TU
7.8 Review Questions, and Problems

02.01a-BM/CT/HDCV/FE 1/1
Lab 5: PRNG (Blum Blum Shub and Linear Guide,
18 U Chapter slides; Lab Manual
Congruential) Practice and Review Lab 5

Chapter 9: Public-Key Cryptosystems


9.1 Principles of Public-Key Cryptosystems
9.2 The RSA Algorithm Explain public key, RSA
9.4 Review Questions, and Problems T Textbook Chapter 9
19
Recommended Reading 2: Chapter 8. Advanced I Chapter slides Study and Review Chapter 9
Number Theory (Euler’s Theorem, Primality Test, Read recommended document
Chinese Remainder Theorem, Discrete
Logarithms)

Guide,
20 Lab 6: RSA LO7 U Chapter slides; Lab Manual
Practice and Review Lab 6

Chapter 10 Explain Diffie-Hellman Key


10.1 Diffie-Hellman Key Exchange Exchange, Elgamal Cryptosystem
T Textbook Chapter 10
21 10.2 Elgamal Cryptographic System
I Chapter slides
Recommended Reading 3: Elliptic Curve Study and Review Chapter 10
Cryptography (10.3, 10.4) Read recommended document

Lab 7: Diffie-Hellman Key Exchange, Elgamal Guide,


22 U Chapter slides; Lab Manual
Cryptosystem Practice and Review Lab 7

Review Chapters 5, 6, 7, 9, 10
Textbook Chapter 5, 6, 7, 9, 10 Review question and problems in
23 (Guiding Problems)
and slides Chapter 5, 6, 7, 9, 10
Progress Test 2 (30’) – Chapters 5, 6, 7, 9, 10

Explain Hash Algorithm ans its


Chapter 11: Secure Hash Algorithm applications
Textbook Chapter 11
24 11.1 Applications of Cryptographic Hash Function T
Chapter slides
11.3 Requirements and Security Study and Review Chapter 11
11.5 Secure Hash Algorithm (SHA) LO8
11.8 Review Questions, and Problems

Guide,
25 Lab 8: MASH U Chapter slides; Lab Manual
Practice and Review Lab 8

Chapter 12. Message Authentication Codes


(MAC)
12.1 Message Authentication Requirements Explain MACs
12.2 Message Authentication Functions Textbook Chapter 12
26 T
12.3 Requirements for MACs Chapter slides Study and Review Chapter 12
12.4 Security of MACs LO9
12.5 MACs Based on Hash Functions: HMAC
12.11 Review Questions, and Problems

Guide,
27 Lab 9: HMAC U Chapter slides; Lab Manual
Practice and Review Lab 9

02.01a-BM/CT/HDCV/FE 1/1
Chapter 13: Digital Signatures
13.2 Elgamal Digital Signature Scheme
13.4 NIST Digital Signature Algorithm Explain Digital Signatures
13.6 RSA-PSS Digital Signature Algorithm Textbook Chapter 13
28 T
Recommended Reading 4: Key Management and Chapter slides Study and Review Chapter 13
Distribution, Public-Key Infrastructure (PKI), X.509 LO10 Read recommended document
Certificates (Chapter 14), Needham-Schroeder;
Kerberos (15.2, 15.3)

Guide,
29 Lab 10: DSA U Chapter slides; Lab Manual
Practice and Review Lab 10
30 Course Review Textbook Review and Prepare to FE
FINAL EXAM

02.01a-BM/CT/HDCV/FE 1/1
ASSESSMENT STRUCTURE/ CẤU TRÚC ĐÁNH GIÁ

Number of Scope of knowledge and skill


Assessment Learning Type of
Part Weight Duration questions of questions
Category Outcomes questions
Phần Trọng số Thời lượng Số lượng Phạm vi kiến thức và kỹ năng
Hạng mục đánh giá Đầu ra Loại câu hỏi
câu hỏi của câu hỏi

60-90'/each practical
1 Lab 10 30% technical aspect of studied topics
in class exercises

Test 1: cover Chapters 1, 2, 3


MC or a suitable
2 Progress Test 2 20% 30'/each 15-20 Test 2: cover Chapters 5, 6, 7, 9,
format
10

concepts, algorithms;all studied


3 Final Exam 1 40% 60' MC 50
Chapters

Participation in
10%
discussions

02.01a-BM/CT/HDCV/FE 1/1 9/12


Lưu ý: Khi sử dụng biểu mẫu, có thể thay thế logo tương ứng của khối.

02.01a-BM/CT/HDCV/FE 1/1 10/12


TRÚC ĐÁNH GIÁ

How? Note
Cách thức đánh giá? Ghi chú

Guided by instructor
10 Labs are arranged relevant to
the chapter theory; Student must
finish labs and submit the results to
the lecturer in class; An average
point of all labs could be evaluated
and published to students at the
end of the semester

Instruction and schedules for Progress Tests must be


presented in the Course Implementation Plan approved by
director of the campus.
The test must be taken right after the last lectures of required
in class, by instructor
material.
Instructor has responsibility to review the test for students after
graded.

The exam questions must be updated or different at least 70%


by exam board,
to the previous ones.

02.01a-BM/CT/HDCV/FE 1/1 11/12


ITU TERM
Introduce:
Intent: Touch on or briefly expose the students to this topic

Relationship to learning objectives: No specific learning objective of knowledge retention is linked to this t
Time: Typically less than one hour of dedicated lecture/discussion/laboratory time is spent on this topic

Relationship to assignments: No assignments/exercises/projects/homework are specifically linked to this

Relationship to assessment: This topic would probably not be assessed on a test or other evaluation instr

Example: At the beginning of class an example is given of the operation of an engineering system to mot
aspect of the design. But, no explicit discussion of the design or analysis of operation is presented

Example: An ethical problem or dilemma is presented to the students that sets the context for an example
lecture. But, no explicit treatment of ethics or its role in modern engineering practice is presented.

Teach:
Intent: Really try to get students to learn new material
Relationship to Learning objective: is to advance at least one cognitive level (e.g. no exposure to knowled
knowledge to comprehension, comprehension to application, etc.)
Time: Typically 1 or more hours of dedicated lecture/discussion/laboratory time are spent on this topic:

Relationship to assignment: Assignments/exercises/projects/homework are specifically linked to this topic

Relationship to assessment: This topic would probably be assessed on a test or other evaluation instrume

Example: The process and methodology of product design are explicitly presented to and exercised by
students on a project or assignment.
Utilize:
Intent: Assumes the student already has a certain level of proficiency in this topic
Time: No time explicitly allotted to teaching this topic
Relationship to assessment:Tests are not designed to explicitly assess this topic
Example: When working in a laboratory session, students are expected to utilize their skills of
experimentation. But, no further explicit instruction on techniques of experimentation are given.

02.01a-BM/CT/HDCV/FE 1/1

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy