0% found this document useful (0 votes)
84 views1 page

OBJECTIVES: The Student Should Be Made To

This document outlines the objectives and units of study for the course CS6701 Cryptography and Network Security. The objectives are to understand classical encryption techniques, finite fields and number theory, block and stream cipher models, and public key cryptosystems, hash functions, and digital signatures. The five units cover introduction and number theory, block ciphers and public key cryptography, hash functions and digital signatures, security practice and system security, and e-mail, IP, and web security.

Uploaded by

LiNu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
84 views1 page

OBJECTIVES: The Student Should Be Made To

This document outlines the objectives and units of study for the course CS6701 Cryptography and Network Security. The objectives are to understand classical encryption techniques, finite fields and number theory, block and stream cipher models, and public key cryptosystems, hash functions, and digital signatures. The five units cover introduction and number theory, block ciphers and public key cryptography, hash functions and digital signatures, security practice and system security, and e-mail, IP, and web security.

Uploaded by

LiNu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 1

CS6701 CRYPTOGRAPHY AND NETWORK SECURITY

OBJECTIVES: The student should be made to:

Understand OSI security architecture and classical encryption techniques.

Acquire fundamental knowledge on the concepts of finite fields and number theory.

Understand various block cipher and stream cipher models.

Describe the principles of public key cryptosystems, hash functions and digital signature.

UNIT
I
INTRODUCTION & NUMBER THEORY 10
Services, Mechanisms and attacks-the OSI security architecture-Network security modelClassical Encryption techniques (Symmetric cipher model, substitution techniques, transposition
techniques, steganography).FINITE FIELDS AND NUMBER THEORY: Groups, Rings, FieldsModular arithmetic-Euclids algorithm-Finite fields- Polynomial Arithmetic Prime numbersFermats and Eulers theorem-Testing for primality -The Chinese remainder theorem- Discrete
logarithms.
UNIT
II
BLOCK CIPHERS & PUBLIC KEY CRYPTOGRAPHY 10
Data Encryption Standard-Block cipher principles-block cipher modes of operation-Advanced
Encryption Standard (AES)-Triple DES-Blowfish-RC5 algorithm. Public key
cryptography: Principles of public key cryptosystems-The RSA algorithm-Key management
Diffie Hellman Key exchange-Elliptic curve arithmetic-Elliptic curve cryptography.
UNIT
III
HASH FUNCTIONS AND DIGITAL SIGNATURES 8
Authentication requirement Authentication function MAC Hash function Security of hash
function and MAC MD5 SHA HMAC CMAC Digital signature and authentication protocols
DSS EI Gamal Schnorr.
UNIT
IV
SECURITY PRACTICE & SYSTEM SECURITY 8
Authentication applications Kerberos X.509 Authentication services Internet Firewalls for
Trusted System: Roles of Firewalls Firewall related terminology- Types of Firewalls Firewall
designs SET for E-Commerce Transactions. Intruder Intrusion detection system Virus and
related threats Countermeasures Firewalls design principles Trusted systems Practical
implementation of cryptography and security.
UNIT
V
E-MAIL, IP & WEB SECURITY 9
E-mail Security: Security Services for E-mail-attacks possible through E-mail establishing keys
privacy-authentication of the source-Message Integrity-Non-repudiation-Pretty Good PrivacyS/MIME.IPSecurity: Overview of IPSec IP and IPv6-Authentication Header-Encapsulation
Security Payload (ESP)-Internet Key Exchange (Phases of IKE, ISAKMP/IKE Encoding). Web
Security: SSL/TLS Basic Protocol-computing the keys- client authentication-PKI as deployed by
SSLAttacks fixed in v3- Exportability-Encoding-Secure Electronic Transaction (SET).
TEXT BOOKS:
1. William Stallings, Cryptography and Network Security, 6th Edition, Pearson Education, March 2013.
(UNIT I,II,III,IV).
2. Charlie Kaufman, Radia Perlman and Mike Speciner, Network Security, Prentice Hall of India, 2002.
(UNIT V).

You might also like