Text Book: Behrouz A Forouzan, Debdeep Mukhopadhyay, Cryptography and Network Security, Mc Graw Hill, Third Edition, 2015.
Reference Book: William Stallings, Cryptography and Network Security Principles and Practices, 4th Edition.
PDF Slides (adapted from the slides made by the above Textbook authors (Click Here)
Introduction
Symmetric Key Cryptography
Traditional Ciphers
Mathematical Background
Modern Ciphers
Block Ciphers: DES, AES, Modes of Operation
Stream Ciphers: RC4, A5/1
Asymmetric Key Cryptography
Mathematical Background
Public Key Cryptosystems
Key Management
Message Integrity and Message Authentication
Cryptographic Hash Functions
Entity Authentication
Digital Signatures