Cse403:Network Security and Cryptography

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3
At a glance
Powered by AI
The key takeaways are that the course covers topics like symmetric and asymmetric cryptographic algorithms, traditional ciphers, hashing functions, digital signatures, and network security protocols.

The main topics covered in the course include introduction to cryptography, symmetric key ciphers like DES and AES, asymmetric key ciphers like RSA and ElGamal, hash functions, digital signatures, key management, and network layer security protocols.

Some of the traditional symmetric ciphers discussed include substitution ciphers like Caesar cipher and polyalphabetic ciphers like Vigenere cipher, transposition ciphers, Playfair cipher, and Hill cipher.

CSE403:NETWORK SECURITY AND CRYPTOGRAPHY

L:3 T:0 P:2 Credits:4

Course Outcomes: Through this course students should be able to

• Identify various symmetric and asymmetric cryptographic algorithms

• Enumerate different traditional cryptographic ciphers

• evaluate different approaches to quantifying secrecy

• simulate various ubiquitous ciphers

• apply basic concepts in information security, including security policies, security models
and security mechanisms for improving the security of computing systems

• analyze the differences between secret key and public key cryptosystems

Unit I
Introduction and mathematics of cryptography : Security Goals, Cryptographic Attacks,
Services and Mechanism, Extended Euclidean Algorithm and Modular Arithmetic
Classification of attacks for wireless adhoc and VANET : Attacks at the Physical, MAC and
Network Layer, Attacks at the Transport, Application Layer and on VANET
Traditional symmetric-key cipher : Symmetric key cipher, cryptanalysis, Substitution and
Transposition cipher
Unit II
Modern Symmetric-key Encipherment : GF(2^n) Fields, DES - Structure, Analysis and Security of
DES, AES - Introduction, Transformations, Key Expansion and Ciphers, Use of modern block ciphers
Unit III
Assymetric-key Encipherment : Mathematics of Asymmetric cryptography - Prime and Primality
Testing, Factorization and Chinese Remainder Theorem, Difference of Symmetric and Assymetric
Cryptosystems, RSA Cryptosystem, Rabin Cryptosystem, ElGamal Cryptosystem
Unit IV
Message integrity and Hash function : Message Integrity, Message Authentication, Iterated Hash
Function, Whirlpool, SHA512, Description of MD Hash family
Unit V
Digital Signature and Key management : Comparison, Process and Attack on digital signature,
RSA and Elgamal Digital signature scheme, Schnoor Digital signature scheme and Digital signature
standards, Symmetric key distribution, Symmetric key agreement, Public-key Distribution
Unit VI
Network Security : Security at Application Layer - Email System and PGP, Security service at
transport layer and SSL architecture, Four SSL protocols, Transport layer security, IP Security
(IPSec) and modes of IPSec, AH and ESP security protocols, security associations and security policy

List of Practicals / Experiments:

Substitution Cipher Basic

• Caesar Cipher, Modified Caesar and Monoalphabetic Cipher - encryption and decryption

• Polyalphabetic Cipher (vigenere and auto key) and One-Time Pad - encryption and decryption

Substitution Cipher Advanced


• Playfair Cipher - encryption and decryption

• Hill Cipher - encryption and decryption

Euclid Algorithm
• Apply and implement Euclid algorithm to generate the GCD and to compute multiplicative inverse of a
number. Apply and implement Extended Euclidean algorithm to find the GCD.

Symmetric Key Encryption Method - DES


• Convert 64 bit key to 56 bit using Permuted choice 1 table and do a left circular shift after splitting to 28
bit left and right
• 64 bit user input plaintext fed to Initial Permutation (IP) table. Split into 32 bit L and R. R bit fed to
Expansion/permutation (E table) to convert into 48 bit
• XORed 48 bit inputs to S-box to make 32 bit output which again input to Permutation Function (P) table

Public Key Encryption Method


• RSA algorithm - Encryption and Decryption

Key Management Method

• Diffie-Hellman method of exchanging cryptographic keys

Text Books:

1. CRYPTOGRAPHY AND NETWORK SECURITY by BEHROUZ A. FOROUZAN, MCGRAW HILL


EDUCATION References:

1. CRYPTOGRAPHY AND NETWORK SECURITY: PRINCIPLES AND PRACTICE, 6/E by WILLIAM


STALLINGS, PEARSON
Page:2/2

You might also like