Cse403:Network Security and Cryptography
Cse403:Network Security and Cryptography
Cse403:Network Security and Cryptography
• apply basic concepts in information security, including security policies, security models
and security mechanisms for improving the security of computing systems
• analyze the differences between secret key and public key cryptosystems
Unit I
Introduction and mathematics of cryptography : Security Goals, Cryptographic Attacks,
Services and Mechanism, Extended Euclidean Algorithm and Modular Arithmetic
Classification of attacks for wireless adhoc and VANET : Attacks at the Physical, MAC and
Network Layer, Attacks at the Transport, Application Layer and on VANET
Traditional symmetric-key cipher : Symmetric key cipher, cryptanalysis, Substitution and
Transposition cipher
Unit II
Modern Symmetric-key Encipherment : GF(2^n) Fields, DES - Structure, Analysis and Security of
DES, AES - Introduction, Transformations, Key Expansion and Ciphers, Use of modern block ciphers
Unit III
Assymetric-key Encipherment : Mathematics of Asymmetric cryptography - Prime and Primality
Testing, Factorization and Chinese Remainder Theorem, Difference of Symmetric and Assymetric
Cryptosystems, RSA Cryptosystem, Rabin Cryptosystem, ElGamal Cryptosystem
Unit IV
Message integrity and Hash function : Message Integrity, Message Authentication, Iterated Hash
Function, Whirlpool, SHA512, Description of MD Hash family
Unit V
Digital Signature and Key management : Comparison, Process and Attack on digital signature,
RSA and Elgamal Digital signature scheme, Schnoor Digital signature scheme and Digital signature
standards, Symmetric key distribution, Symmetric key agreement, Public-key Distribution
Unit VI
Network Security : Security at Application Layer - Email System and PGP, Security service at
transport layer and SSL architecture, Four SSL protocols, Transport layer security, IP Security
(IPSec) and modes of IPSec, AH and ESP security protocols, security associations and security policy
• Caesar Cipher, Modified Caesar and Monoalphabetic Cipher - encryption and decryption
• Polyalphabetic Cipher (vigenere and auto key) and One-Time Pad - encryption and decryption
Euclid Algorithm
• Apply and implement Euclid algorithm to generate the GCD and to compute multiplicative inverse of a
number. Apply and implement Extended Euclidean algorithm to find the GCD.
Text Books: