0% found this document useful (0 votes)
112 views1 page

CS6701 Syllabus Cryptography and Network Security

This document outlines the syllabus for a course on Cryptography and Network Security. It covers 5 units: 1) Introduction to cryptography theories, algorithms, and building protection mechanisms. Topics include classical encryption techniques and foundations of modern cryptography. 2) Symmetric key cryptography including symmetric ciphers, block cipher principles, AES, and key distribution. 3) Public key cryptography including the mathematics behind asymmetric ciphers and algorithms like RSA, Diffie-Hellman, and Elliptic Curve Cryptography. 4) Message authentication and integrity including hash functions, digital signatures, and authentication protocols. 5) Security practices including email security with PGP and S/MIME, IP security with IPSec, and web security

Uploaded by

Gomathi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
112 views1 page

CS6701 Syllabus Cryptography and Network Security

This document outlines the syllabus for a course on Cryptography and Network Security. It covers 5 units: 1) Introduction to cryptography theories, algorithms, and building protection mechanisms. Topics include classical encryption techniques and foundations of modern cryptography. 2) Symmetric key cryptography including symmetric ciphers, block cipher principles, AES, and key distribution. 3) Public key cryptography including the mathematics behind asymmetric ciphers and algorithms like RSA, Diffie-Hellman, and Elliptic Curve Cryptography. 4) Message authentication and integrity including hash functions, digital signatures, and authentication protocols. 5) Security practices including email security with PGP and S/MIME, IP security with IPSec, and web security

Uploaded by

Gomathi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

CS8792 CRYPTOGRAPHY AND NETWORK CS6701 Syllabus Cryptography and

SECURITY  Network Security


OBJECTIVES:
 To understand Cryptography Theories, Algorithms and
Systems. UNIT I INTRODUCTION & NUMBER THEORY
10 
 To understand necessary Approaches and Techniques
Services, Mechanisms and attacks-the OSI security
to build protection
architecture-Network security model-Classical
mechanisms in order to secure computer networks.
Encryption techniques (Symmetric cipher model,
UNIT I INTRODUCTION 
substitution techniques, transposition techniques,
Security trends – Legal, Ethical and Professional Aspects
steganography).FINITE FIELDS AND NUMBER
of Security, Need for Security at Multiple levels, Security
THEORY: Groups, Rings, Fields-Modular arithmetic-
Policies – Model of network security – Security attacks,
Euclid‟s algorithm-Finite fields- Polynomial Arithmetic
services and mechanisms – OSI security architecture –
–Prime numbers-Fermat‟s and Euler‟s theorem-Testing
Classical encryption techniques: substitution techniques,
for primality -The Chinese remainder theorem- Discrete
transposition techniques, steganography- Foundations of
logarithms.
modern cryptography: perfect security – information
UNIT II BLOCK CIPHERS & PUBLIC KEY
theory – product cryptosystem – cryptanalysis.
CRYPTOGRAPHY 10 CS6701 Syllabus
UNIT II SYMMETRIC KEY CRYPTOGRAPHY
Cryptography and Network Security
MATHEMATICS OF SYMMETRIC KEY
Data Encryption Standard-Block cipher principles-block
CRYPTOGRAPHY: Algebraic structures – Modular
cipher modes of operation-Advanced Encryption
arithmetic-Euclid‟s algorithm- Congruence and matrices
Standard (AES)-Triple DES-Blowfish-RC5 algorithm.
-Groups, Rings, Fields- Finite fields- SYMMETRIC
Public key cryptography: Principles of public key
KEY CIPHERS: SDES – Block cipher Principles of DES
cryptosystems-The RSA algorithm-Key management –
– Strength of DES – Differential and linear cryptanalysis
Diffie Hellman Key exchange-Elliptic curve arithmetic-
– Block cipher design principles – Block cipher mode of
Elliptic curve cryptography.
operation – Evaluation criteria for AES – Advanced
UNIT III HASH FUNCTIONS AND DIGITAL
Encryption Standard – RC4 –
SIGNATURES 8 CS6701 Syllabus Cryptography and
Key distribution.
Network Security
UNIT III PUBLIC KEY CRYPTOGRAPHY
Authentication requirement – Authentication function –
MATHEMATICS OF ASYMMETRIC KEY
MAC – Hash function – Security of hash function and
CRYPTOGRAPHY: Primes – Primality Testing –
MAC –MD5 – SHA – HMAC – CMAC – Digital
Factorization – Euler‘s totient function, Fermat‘s and
signature and authentication protocols – DSS – EI Gamal
Euler‘s Theorem – Chinese Remainder Theorem –
– Schnorr.
Exponentiation and logarithm – ASYMMETRIC KEY
UNIT IV SECURITY PRACTICE & SYSTEM
CIPHERS: RSA cryptosystem – Key distribution – Key
SECURITY 8 CS6701 Syllabus Cryptography and
management – Diffie Hellman key exchange -ElGamal
Network Security
cryptosystem – Elliptic curve arithmetic-Elliptic curve
Authentication applications – Kerberos – X.509
cryptography.
Authentication services – Internet Firewalls for Trusted
UNIT IV MESSAGE AUTHENTICATION AND
System: Roles of Firewalls – Firewall related
INTEGRITY
terminology- Types of Firewalls – Firewall designs –
Authentication requirement – Authentication function –
SET for E-Commerce Transactions. Intruder – Intrusion
MAC – Hash function – Security of hash function and
detection system – Virus and related threats –
MAC – SHA –Digital signature and authentication
Countermeasures – Firewalls design principles – Trusted
protocols – DSS- Entity Authentication: Biometrics,
systems – Practical implementation of cryptography and
Passwords, Challenge Response protocols-
security.
Authentication applications – Kerberos, X.509
UNIT V E-MAIL, IP & WEB SECURITY 9 CS6701
UNIT V SECURITY PRACTICE AND SYSTEM
Syllabus Cryptography and Network Security
SECURITY
E-mail Security: Security Services for E-mail-attacks
Electronic Mail security – PGP, S/MIME – IP security –
possible through E-mail – establishing keys privacy-
Web Security – SYSTEM SECURITY: Intruders –
authentication of the source-Message Integrity-Non-
Malicious software – viruses – Firewalls.
repudiation-Pretty Good Privacy-S/MIME. IPSecurity:
Overview of IPSec – IP and IPv6-Authentication Header-
Encapsulation Security Payload (ESP)-Internet Key
Exchange (Phases of IKE, ISAKMP/IKE Encoding).
Web Security: SSL/TLS Basic Protocol-computing the
keys- client authentication-PKI as deployed by
SSLAttacks fixed in v3- Exportability-Encoding-Secure
Electronic Transaction (SET).

You might also like