Information Security and Cryptography Updated Syllabus
Information Security and Cryptography Updated Syllabus
Subject Code
Cryptography
20CST354
Total Contact Hours: 45Hours
3 0 0 3
Common to all Specializations of CSE is 4 thYear
Course Objectives
1. To familiarize the students with the basic concepts of services, attacks with its models and concepts of
encryption.
2. To conceptualize digital signature and different encryption algorithm. To state
the various authentication protocols and their requirements.
3. To elucidate an application of security and their effects on security standards.
4. To comprehend IP security and their methods.
5. To familiarize the student this basic encryption and decryptions
Course Outcomes
CO1 Analyze the number theory, classical encryption techniques and block ciphers.
Understand and analyze public-key cryptography, encryption standards, RSA, and other public-key
CO2
cryptosystems.
Explore best security practice and system security such as authentication schemes, firewall
CO4
characteristics and configurations.
Demonstrate and examine the various encryption techniques to secure data in transit across
CO5
network.
UNIT-I
Introduction & Number Theory: Services, Mechanisms and attacks-the OSI security architecture-Network
security model-Classical Encryption techniques (Symmetric cipher model, substitution techniques,
transposition techniques, steganography). Finite fields and Number Theory: Groups, Rings, Fields-
Modular arithmetic-Euclid‟s algorithm-Finite fields- Polynomial Arithmetic –Prime numbers- Fermat‟s
and Euler‟s theorem-Testing for primality -The Chinese remainder theorem- Discrete algorithms.
Block Ciphers: Data Encryption Standard-Block cipher principles-block cipher modes of operation-
Advanced Encryption Standard (AES)-Triple DES-Blowfish-RC5 algorithm.
UNIT II
Public key cryptography: Principles of public key cryptosystems-The RSA algorithm-Key management –
Diffie Hellman Key exchange
Hash Functions and Digital Signatures: Authentication requirement – Authentication function – MAC –
Hash function – Security of hash function and MAC – MD5–SHA512–HMAC – CMAC – Digital signature
and authentication protocols – DSS – EI Gamal – Schnorr.
UNIT III
Security Practice & System Security: Authentication applications – Kerberos – Authentication services –
Internet Firewalls for Trusted System: Roles of Firewalls – Firewall related terminology- Types of Firewalls
– Firewall designs –Intruder – Intrusion detection system – Virus and related threats.
E-mail Security: Security Services for E-mail-attacks possible through E-mail – establishing keys privacy-
authentication of the source-Message Integrity-Privacy-S/MIME.
IP Security and Web Security: Overview of IP Security – IP Address and IPv6-Authentication Header-
Encapsulation Security Payload (ESP)- SSL Architecture and its layers- Transport Layer Security (TLS)-
HTTPS- Secure Shell (SSH)
Text Books:
1. William Stallings, Cryptography and Network Security, 6th Edition, Pearson Education, March 2013.
2. Charlie Kaufman, Radia Perlman and Mike Speciner, “Network Security”, Prentice Hall of India, 2002.
Reference Books:
1. Behrouz A. Ferouzan, “Cryptography & Network Security”, Tata McGrawHill.
2. Man Young Rhee, “Internet Security: Cryptographic Principles”, “Algorithms and Protocols”,
WileyPublications.
3. Charles Pfleeger, “Security in Computing”, 4th Edition, Prentice Hall ofIndia.
4. Ulysess Black, “Internet Security Protocols”, Pearson EducationAsia.
5. Charlie Kaufman and Radia Perlman, Mike Speciner, “Network Security, Second Edition, Private
Communication in Public World”,PHI.
6. William Stallings, “Network Security Essentials (Applications and Standards)”, 4th Edition, Pearson
Education. ,2012
Theory
Components Continuous Internal Assessment (CAE) Semester End
Examination (SEE)
Marks 40 60
Total Marks 100
Relationship between the Course Outcomes (COs) and Program Outcomes (POs)
1 Analyze the number theory. classical encryption Discuss the basics of number theory, network
techniques and block ciphers. security and cryptography algorithms.
3 Design hash functions, MAC algorithms and Explain the various standards Asymmetric
digital signatures. Encryption algorithms to achieve authentication.
4 Explore best security practice and system Explore the knowledge of key exchange protocols.
security such as authentication schemes, firewall Examine the effects on digitized security.
characteristics and configurations.
5 Demonstrate and examine the various Demonstrate encryption techniques to secure
encryption techniques to secure data in transit data in transit across network.
across network.
CO1 1 – – 2 – – – – – – – – – –
CO2 1 3 2 1 – – – – – – – – – 2
CO3 1 3 2 1 – – – – – – – – – 2
CO4 2 2 1 1 – – – – – – – – – 2
CO5 2 2 2 1 – – – – – – – – – 3
CO6 3 3 3 2 – – – – – – – – – 3
20CST354
Course Code
Problem analysis
3
Design/development of solutions
4
Ethics
9
Communication
11
Life-long Learning
12