0% found this document useful (0 votes)
220 views3 pages

Cryptography and Network Security

This document provides information on the Cryptography and Network Security course offered at K. J. Somaiya College of Engineering, Mumbai. The course is for 3 hours per week over 15 weeks, carrying 2 credits. It has 5 modules that cover topics such as data security, cryptography mathematics, symmetric and asymmetric encryption systems, message integrity, authentication, and network security. The course objectives are to understand data security, cryptography algorithms, authentication services, and network threats. Upon completing the course, students will be able to understand cryptography fundamentals, discuss symmetric and asymmetric encryption systems, explain security services, and describe network intrusions and countermeasures.

Uploaded by

KARTIK LADWA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
220 views3 pages

Cryptography and Network Security

This document provides information on the Cryptography and Network Security course offered at K. J. Somaiya College of Engineering, Mumbai. The course is for 3 hours per week over 15 weeks, carrying 2 credits. It has 5 modules that cover topics such as data security, cryptography mathematics, symmetric and asymmetric encryption systems, message integrity, authentication, and network security. The course objectives are to understand data security, cryptography algorithms, authentication services, and network threats. Upon completing the course, students will be able to understand cryptography fundamentals, discuss symmetric and asymmetric encryption systems, explain security services, and describe network intrusions and countermeasures.

Uploaded by

KARTIK LADWA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

K. J.

Somaiya College of Engineering, Mumbai -77


(Autonomous College Affiliated to University of Mumbai)

Course Code Course Title


2UST633 Cryptography and Network Security

TH P TUT Total
Teaching
03 _ -- 03
Scheme(Hrs.)
Credits Assigned 02 -- -- 02
Marks
Examination CA
Scheme ESE TW O P P&O Total
ISE IA
30 20 50 -- -- -- -- 50

Course Pre-requisites: Number Theory

Course Objectives
 The objective of this course is to enable the students to understand the need of data
security and security goals. Course covers the mathematics and working of the cryptographic
algorithms. Course gives the insight about authentication services, authentication algorithms
and creates awareness about network threats and security services.

Course Outcomes
At the end of successful completion of the course the student will be able to
CO1. Understand fundamental knowledge about data security and mathematics of
cryptography.
CO2. Discuss symmetric encryption systems and its key management.
CO3. Discuss asymmetric encryption systems and its key management.
CO4. Explain message integrity, authentication and its related security services.
CO5. Describe network intrusions and their counter measures.
K. J. Somaiya College of Engineering, Mumbai -77
(Autonomous College Affiliated to University of Mumbai)

Module Unit Details Hrs. CO


No. No.
1 Data Security & Mathematics of cryptography
1.1 Security goals, cryptography, security attacks, security
services and security mechanism, cryptanalysis.
1.2 Mathematics of cryptography –Primes, factorization,
modular arithmetic, Fermat’s little theorem, Euler’s 8 CO1
theorem, extended Euclidean algorithm, Chinese
Remainder Theorem.
#Self-Learning: Algebriac Structures, Group, Ring, Field,
GF(2n )
2 Symmetric Key Encipherment and Key Management
2.1 Classical Encryption Techniques - Substitution
Technique, Transposition Technique, Steganography
2.2 Stream and Block ciphers, block ciphers modes of
operation.
2.3 Encryption Algorithms- Simplified DES, Data 10 CO2
Encryption Standard, Double and triple DES, Simplified
AES and Advanced Encryption Standard (AES).
2.4 Key management - Symmetric key Distribution,
Kerberos, Symmetric key agreement and security of
Diffie Hellman key exchange security.
3 Asymmetric key Encipherment and Key Management
3.1 Principles of Asymmetric key Encipherment
3.2 RSA Algorithm, attacks on RSA, Rabin cryptosystem, 10 CO3
Elgamal Cryptosystem and Elliptical curve cryptography
3.3 Key Management - Public key distribution
4 Message Integrity and Authentication
4.1 Message integrity, Message authentication Requirements
and Functions, Message authentication codes.
4.2 Cryptographic Hash Functions –Hash Functions,
Description of MD hash family and SHA – 512. 10 CO4
4.3 Digital Signature - RSA Digital Signature, Elgamel
Digital Signature, Digital Signature algorithm.
4.4 Entity Authentication – Password Based Authentication,
Biometrics.
5 System and Network Security
5.1 Malicious Programs - Worms, Virus, Logic bombs,
Trojans, Spyware, Adwares.
5.2 Intrusion Detection System, Virus Countermeasures
7 CO5
5.3 Firewalls – Design Principles and Characteristics, Types
of firewalls, Firewall Configurations.
5.4 Network Security at Application layer - Email System,
Pretty Good Privacy (PGP), S/MIME.
Total 45
K. J. Somaiya College of Engineering, Mumbai -77
(Autonomous College Affiliated to University of Mumbai)

Recommended Books:

Sr. Name/s of Author/s Title of Book Name of Edition and


No. Publisher with Year of
country Publication
1. William Stalling Cryptography and Network Pearson 5th edition,
Security: Principles and Education Asia 2013
Practice
2. Behrouz A. Forouzan, Cryptography and Network Mc Graw Hill 3rd edition,
Debdeep Security Publication 2016
Mukhopadhyay
3. Bernard Menezes Network Security and Cengage 1st edition,
Cryptography Learning 2011
4. Atul Kahate Cryptography and Network Mc Graw Hill 3rd edition,
Security Publication. 2017

# Learners should prepare all self-learning topics on their own. Self-learning topics will
enable students to gain extended knowledge of the topic. Assessment of these topics may
be included in IA.

You might also like