# College of Science

## Data Security I

 Course Code C0167 Th 4 Pr 4 CrHrs 3

This Course presents the principles of data security and the science behind every form of security starting with the conventional encryption systems to the modern encryption systems. So, the students will acquire the knowledge about most of common cryptographic techniques along with most common types of attacks that can be utilized to ruin the security of these techniques

At the end of this course the students should have the ability to:

1. Design secure system based on cryptographic algorithms.
2. Differentiate between types of encryption algorithms and be able to choose the best one based on its level of security.

3Analyze most common types of attacks and find ways to defend the system from these attacks.

4-Ill ustrate the use of Public and Private Key algorithms in building secure and modern system.

 Distribution of Marks Final Mark Final Exam Second Term Mid-Year First Term 100 Prac. Theor. Prac. Theor. Prac. Theor. Prac. Theor. 20 30 5 5 10 20 5 5
 References SN William Stalling, “Cryptography and network security, principles and practices”, 4th edition, prentice hall, Pearson education international, 2011 1 Alan G. Konheim, “ Computer security and cryptography ”, John Wiley & Sons, 2007 2 Hans Delfs, Helmut Knebl, "Introduction to Cryptography, principles and applications", 2nd edition, Springer-Verlag Berlin Heidelberg, 2007 3
 Introduction to data security, Basic Terminology of Cryptography, Classification of Cryptographic System. Codes and Ciphers, Cryptography Objectives, Cryptanalysis Attacks. Types   of         Classical           Cipher Methods, Transposition Cipher, Rail Fence Cipher, Route Cipher, Simple Columnar Transposition, Keyword Columnar Transposition. Substitution Cipher, Types of Substitution Cipher, Monoalphabetic Substitution Cipher, Security of Monoalphabetic Cipher. Caesar Cipher Method, Cryptanalysis of Caesar Cipher, Affine Cipher. Introduction to Number Theory, Modular Arithmetic, Greatest Common Divisor (GCD),Euclidean Algorithm. Introduction to practical security, Diffusion and Confusion, Shannon’s five criteria. Concept of randomness, statistical tests for randomness, Introduction to stream cipher, One Time Pad (OTP) .