0% found this document useful (0 votes)
99 views2 pages

CNS Syllabus

This document outlines the course objectives and units for a cryptography and network security course. The course aims to help students understand cryptography theories, algorithms, and systems to secure computer networks. It is divided into 5 units that cover topics such as classical and modern cryptography, symmetric and public key cryptography, message authentication, security practices, and system security. The course outcomes are that students will be able to understand network security fundamentals, apply cryptographic operations of symmetric and public key algorithms, apply authentication schemes, and understand various security practices and standards.

Uploaded by

kathiravan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
99 views2 pages

CNS Syllabus

This document outlines the course objectives and units for a cryptography and network security course. The course aims to help students understand cryptography theories, algorithms, and systems to secure computer networks. It is divided into 5 units that cover topics such as classical and modern cryptography, symmetric and public key cryptography, message authentication, security practices, and system security. The course outcomes are that students will be able to understand network security fundamentals, apply cryptographic operations of symmetric and public key algorithms, apply authentication schemes, and understand various security practices and standards.

Uploaded by

kathiravan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

CS8792 CRYPTOGRAPHY AND NETWORK SECURITY LTPC

3003

OBJECTIVES:

 To understand Cryptography Theories, Algorithms and Systems.

 To understand necessary Approaches and Techniques to build protection mechanisms in


order to secure computer networks.

UNIT I

INTRODUCTION 9

Security trends - Legal, Ethical and Professional Aspects of Security, Need for Security at
Multiple levels, Security Policies - Model of network security – Security attacks, services and
mechanisms – OSI security architecture – Classical encryption techniques: substitution
techniques, transposition techniques, steganography- Foundations of modern cryptography:
perfect security – information theory – product cryptosystem – cryptanalysis.

UNIT II

SYMMETRIC KEY CRYPTOGRAPHY 9


MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures -
Modular arithmetic-Euclid‟s algorithm- Congruence and matrices - Groups, Rings, Fields-
Finite fields- SYMMETRIC KEY CIPHERS: SDES – Block cipher Principles of DES –
Strength of 80 DES – Differential and linear cryptanalysis - Block cipher design principles –
Block cipher mode of operation – Evaluation criteria for AES – Advanced Encryption
Standard - RC4 – Key distribution.

UNIT III PUBLIC KEY CRYPTOGRAPHY 9

MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality


Testing – Factorization – Euler‘s totient function, Fermat‘s and Euler‘s Theorem - Chinese
Remainder Theorem – Exponentiation and logarithm - ASYMMETRIC KEY CIPHERS:
RSA cryptosystem – Key distribution – Key management – Diffie Hellman key exchange -
ElGamal cryptosystem – Elliptic curve arithmetic-Elliptic curve cryptography.

UNIT IV MESSAGE AUTHENTICATION AND INTEGRITY 9

Authentication requirement – Authentication function – MAC – Hash function – Security of


hash function and MAC – SHA –Digital signature and authentication protocols – DSS- Entity
Authentication: Biometrics, Passwords, Challenge Response protocols- Authentication
applications - Kerberos, X.509

UNIT V SECURITY PRACTICE AND SYSTEM SECURITY 9

Electronic Mail security – PGP, S/MIME – IP security – Web Security - SYSTEM


SECURITY: Intruders – Malicious software – viruses – Firewalls.

TOTAL 45 PERIODS

OUTCOMES: At the end of the course, the student should be able to:
 Understand the fundamentals of networks security, security architecture, threats and
vulnerabilities

 Apply the different cryptographic operations of symmetric cryptographic algorithms

 Apply the different cryptographic operations of public key cryptography

 Apply the various Authentication schemes to simulate different applications.

 Understand various Security practices and System security standards

TEXT BOOK: 1. William Stallings, Cryptography and Network Security: Principles and
Practice, PHI 3rd Edition, 2006.

REFERENCES: 1. C K Shyamala, N Harini and Dr. T R Padmanabhan: Cryptography and


Network Security, Wiley India Pvt.Ltd 2. BehrouzA.Foruzan, Cryptography and Network
Security, Tata McGraw Hill 2007. 3. Charlie Kaufman, Radia Perlman, and Mike Speciner,
Network Security: PRIVATE Communication in a PUBLIC World, Prentice Hall, ISBN 0-
13-046019-2.

You might also like