CS8792- CRYPTOGRAPHY AND NETWORK SECURITY Syllabus 2017 Regulation

0
1117

CS8792- CRYPTOGRAPHY AND NETWORK SECURITY Syllabus 2017 Regulation

CRYPTOGRAPHY AND NETWORK SECURITY Syllabus 2017 Regulation,CS8792- CRYPTOGRAPHY AND NETWORK SECURITY Syllabus 2017 Regulation

CS8792                 CRYPTOGRAPHY AND NETWORK SECURITY                        L T P C
                                                                                                                            3 0 0 3

OBJECTIVES:

  • To understand Cryptography Theories, Algorithms and Systems.
  • To understand necessary Approaches and Techniques to build protection mechanisms in order to secure computer networks.

UNIT I INTRODUCTION                                                   9

Security trends – Legal, Ethical and Professional Aspects of Security, Need for Security at Multiple levels, Security Policies – Model of network security – Security attacks, services and mechanisms – OSI security architecture – Classical encryption techniques: substitution techniques, transposition techniques, steganography- Foundations of modern cryptography: perfect security – information theory – product cryptosystem – cryptanalysis.

UNIT II SYMMETRIC KEY CRYPTOGRAPHY                 9

MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures – Modular arithmetic-Euclid‟s algorithm- Congruence and matrices – Groups, Rings, Fields- Finite fields- SYMMETRIC KEY CIPHERS: SDES – Block cipher Principles of DES – Strength of DES – Differential and linear cryptanalysis – Block cipher design principles – Block cipher mode of operation – Evaluation criteria for AES – Advanced Encryption Standard – RC4 – Key distribution.

UNIT III PUBLIC KEY CRYPTOGRAPHY                        9

MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing – Factorization – Euler‘s totient function, Fermat‘s and Euler‘s Theorem – Chinese Remainder Theorem – Exponentiation and logarithm – ASYMMETRIC KEY CIPHERS: RSA cryptosystem – Key distribution – Key management – Diffie Hellman key exchange – ElGamal cryptosystem – Elliptic curve arithmetic-Elliptic curve cryptography.

UNIT IV MESSAGE AUTHENTICATION AND INTEGRITY                                                                       9

Authentication requirement – Authentication function – MAC – Hash function – Security of hash function and MAC – SHA –Digital signature and authentication protocols – DSS- Entity Authentication: Biometrics, Passwords, Challenge Response protocols- Authentication applications – Kerberos, X.509

UNIT V SECURITY PRACTICE AND SYSTEM SECURITY                                                                        9

Electronic Mail security – PGP, S/MIME – IP security – Web Security – SYSTEM SECURITY: Intruders – Malicious software – viruses – Firewalls.

                                                                                                       TOTAL 45 PERIODS

OUTCOMES:

At the end of the course, the student should be able to:

  • Understand the fundamentals of networks security, security architecture, threats and vulnerabilities
  • Apply the different cryptographic operations of symmetric cryptographic algorithms
  • Apply the different cryptographic operations of public key cryptography
  • Apply the various Authentication schemes to simulate different applications.
  • Understand various Security practices and System security standards

TEXT BOOK:

  1. William Stallings, Cryptography and Network Security: Principles and Practice, PHI 3rd Edition, 2006.

REFERENCES:

  1. C K Shyamala, N Harini and Dr. T R Padmanabhan: Cryptography and Network Security, Wiley India Pvt.Ltd
  2. BehrouzA.Foruzan, Cryptography and Network Security, Tata McGraw Hill 2007.
  3. Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: PRIVATE Communication in a PUBLIC World, Prentice Hall, ISBN 0-13-046019-2

LEAVE A REPLY

Please enter your comment!
Please enter your name here