0
1117

# CS8792- CRYPTOGRAPHY AND NETWORK SECURITY Syllabus 2017 Regulation

CRYPTOGRAPHY AND NETWORK SECURITY Syllabus 2017 Regulation,CS8792- CRYPTOGRAPHY AND NETWORK SECURITY Syllabus 2017 Regulation

CS8792Â  Â  Â  Â  Â  Â  Â  Â  Â CRYPTOGRAPHY AND NETWORK SECURITYÂ  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â Â L T P C
Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  3 0 0 3

OBJECTIVES:

• To understand Cryptography Theories, Algorithms and Systems.
• To understand necessary Approaches and Techniques to build protection mechanisms in order to secure computer networks.

## UNIT I INTRODUCTIONÂ  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â 9

Security trends – Legal, Ethical and Professional Aspects of Security, Need for Security at Multiple levels, Security Policies – Model of network security â€“ Security attacks, services and mechanisms â€“ OSI security architecture â€“ Classical encryption techniques: substitution techniques, transposition techniques, steganography- Foundations of modern cryptography: perfect security â€“ information theory â€“ product cryptosystem â€“ cryptanalysis.

## UNIT II SYMMETRIC KEY CRYPTOGRAPHYÂ  Â  Â  Â  Â  Â  Â  Â  Â 9

MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures – Modular arithmetic-Euclidâ€Ÿs algorithm- Congruence and matrices – Groups, Rings, Fields- Finite fields- SYMMETRIC KEY CIPHERS: SDES â€“ Block cipher Principles of DES â€“ Strength of DES â€“ Differential and linear cryptanalysis – Block cipher design principles â€“ Block cipher mode of operation â€“ Evaluation criteria for AES â€“ Advanced Encryption Standard – RC4 â€“ Key distribution.

## UNIT III PUBLIC KEY CRYPTOGRAPHYÂ  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  9

MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes â€“ Primality Testing â€“ Factorization â€“ Eulerâ€˜s totient function, Fermatâ€˜s and Eulerâ€˜s Theorem – Chinese Remainder Theorem â€“ Exponentiation and logarithm – ASYMMETRIC KEY CIPHERS: RSA cryptosystem â€“ Key distribution â€“ Key management â€“ Diffie Hellman key exchange – ElGamal cryptosystem â€“ Elliptic curve arithmetic-Elliptic curve cryptography.

## UNIT IV MESSAGE AUTHENTICATION AND INTEGRITYÂ  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â 9

Authentication requirement â€“ Authentication function â€“ MAC â€“ Hash function â€“ Security of hash function and MAC â€“ SHA â€“Digital signature and authentication protocols â€“ DSS- Entity Authentication: Biometrics, Passwords, Challenge Response protocols- Authentication applications – Kerberos, X.509

## UNIT V SECURITY PRACTICE AND SYSTEM SECURITYÂ  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  9

Electronic Mail security â€“ PGP, S/MIME â€“ IP security â€“ Web Security – SYSTEM SECURITY: Intruders â€“ Malicious software â€“ viruses â€“ Firewalls.

Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â  Â TOTAL 45 PERIODS

OUTCOMES:

At the end of the course, the student should be able to:

• Understand the fundamentals of networks security, security architecture, threats and vulnerabilities
• Apply the different cryptographic operations of symmetric cryptographic algorithms
• Apply the different cryptographic operations of public key cryptography
• Apply the various Authentication schemes to simulate different applications.
• Understand various Security practices and System security standards

TEXT BOOK:

1. William Stallings, Cryptography and Network Security: Principles and Practice, PHI 3rd Edition, 2006.

REFERENCES:

1. C K Shyamala, N Harini and Dr. T R Padmanabhan: Cryptography and Network Security, Wiley India Pvt.Ltd
2. BehrouzA.Foruzan, Cryptography and Network Security, Tata McGraw Hill 2007.
3. Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: PRIVATE Communication in a PUBLIC World, Prentice Hall, ISBN 0-13-046019-2