Lecture2 Intro (Part-II)
Lecture2 Intro (Part-II)
• Research Interests
• Cryptography, Password-based Cryptosystems, Biometric Security, Information
Security, Blockchain Technology…
• Google scholar link: https://scholar.google.co.in/citations?user=nqSP0nIAAAAJ&hl=en
Spring Semester 2024: Timetable
Lecture Time: 9:30 – 10:55 AM (Monday & Wednesday)
Credits: 3
Contact Hours (L:T:P): 3:0:0
• Relative Grading
• Cryptography Basics: Stream Ciphers and Block Ciphers, Public Key Cryptography,
Hash Functions
Cryptography
Security
Cryptography
Information Security
The term ‘information security’ means protecting
information and information systems from
unauthorized access, use, disclosure, disruption,
modification, or destruction in order to provide
confidentiality, integrity and availability
• Considering the
Threats also known as
Disclosure, Alteration,
and Denial (DAD)
• A Model for malicious
user
Disclosure
• Impact on an organization
• Degradation to perform its primary functions
• Damage to organizational assets
• Financial loss
• Harm to individual