0% found this document useful (0 votes)
40 views2 pages

Crypto Syllabus4

This document contains the syllabus for the course "Cryptography and Network Security" for the Bachelor of Technology in Computer Science and Engineering program at Maulana Abul Kalam Azad University of Technology, West Bengal for the 2018-2019 academic year. The syllabus outlines the course code, duration, teaching scheme, examination scheme and units to be covered including topics like attacks on computers and security, cryptography concepts and techniques, symmetric and asymmetric key algorithms like DES, RSA, internet security protocols, email security, and firewalls. Reference books for the course are also listed.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views2 pages

Crypto Syllabus4

This document contains the syllabus for the course "Cryptography and Network Security" for the Bachelor of Technology in Computer Science and Engineering program at Maulana Abul Kalam Azad University of Technology, West Bengal for the 2018-2019 academic year. The syllabus outlines the course code, duration, teaching scheme, examination scheme and units to be covered including topics like attacks on computers and security, cryptography concepts and techniques, symmetric and asymmetric key algorithms like DES, RSA, internet security protocols, email security, and firewalls. Reference books for the course are also listed.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Maulana Abul Kalam Azad University of Technology, West Bengal

(Formerly West Bengal University of Technology)


Syllabus for B. Tech in Computer Science & Engineering
(Applicable from the academic session 2018-2019)

Reciprocity Theorems;
5 Graph theory: Tree, Co-tree, fundamental cut-set, 6
fundamental loop analysis of network; Analog filter
design: Butterworth, Sallen Key, frequency
transformation and scaling;

Text book and Reference books:

1. Signals and Systems by P. Ramesh Babu & R. Ananda Natarajan, Scitech Publications
(India) .
2. Signals & Systems by A. V. Oppenheim, A. S. Willsky and S. H. Nawab, Prentice-Hall
India .
3. Networks & Systems by D Roy Choudhury .
4. Networks & Systems by Asfhaq Husain.

Cryptography and Network Security


Code: PEC-CS801B
Contact: 3L

Name of the Course: Cryptography and Network Security

Course Code: PEC-CS801B Semester: VIII


Duration: 6 months Maximum Marks: 100
Teaching Scheme Examination Scheme

Theory: 3 hrs./week Mid Semester exam: 15


Tutorial: NIL Assignment and Quiz: 10 marks
Attendance: 5 marks
Practical: NIL End Semester Exam : 70 Marks
Credit Points: 3

Unit Content Hrs/Unit Marks/Unit


Attacks on Computers & Computer Security -
1 Introduction, Need for Security, Security 5
approaches, Principles of Security, Types of attack
Cryptography: Concepts & Techniques-
2 Introduction, Plaintext & Cipher text, Substitution 7
Techniques, Transposition Techniques, Encryption
& Decryption, Symmetric & Asymmetric key
Cryptography, Key Range & Key Size
2
PG
Maulana Abul Kalam Azad University of Technology, West Bengal
(Formerly West Bengal University of Technology)
Syllabus for B. Tech in Computer Science & Engineering
(Applicable from the academic session 2018-2019)

Symmetric Key Algorithm - Introduction,


3 Algorithm types & Modes, Overview of Symmetric 8
Key Cryptography, DES(Data Encryption Standard)
algorithm, IDEA(International Data Encryption
Algorithm) algorithm, RC5(Rivest Cipher 5)
algorithm.
Asymmetric Key Algorithm, Digital Signature and
4. RSA - Introduction, Overview of Asymmetric key 5
Cryptography, RSA algorithm, Symmetric &
Asymmetric key Cryptography together, Digital
Signature, Basic concepts of Message Digest and
Hash Function (Algorithms on Message Digest and
Hash function not required).
5 Internet Security Protocols, User Authentication - 6
Basic Concepts, SSL protocol, Authentication
Basics, Password, Authentication Token, Certificate
based Authentication, Biometric Authentication.
6 Electronic Mail Security - Basics of mail security, 4
Pretty Good Privacy, S/MIME.
7 Firewall - Introduction, Types of firewall, Firewall 3
Configurations, DMZ Network

Text book and Reference books:

1. “Cryptography and Network Security”, William Stallings, 2nd Edition, Pearson Education
Asia
2. “Cryptography and Network Security” by V.K. Jain, Khanna Publishing House,
3. “Network Security private communication in a public world”, C. Kaufman, R. Perlman and
M. Speciner, Pearson
4. Cryptography & Network Security: Atul Kahate, TMH.
5. “Network Security Essentials: Applications and Standards” by William Stallings, Pearson.
6. “Designing Network Security”, Merike Kaeo, 2nd Edition, Pearson Books
7. “Building Internet Firewalls”, Elizabeth D. Zwicky, Simon Cooper, D. Brent Chapman, 2nd
Edition, Oreilly .
8. “Practical Unix & Internet Security”, Simson Garfinkel, Gene Spafford, Alan Schwartz, 3rd
Edition, Oreilly

3
PG

You might also like