Cryptography and Network Security
Cryptography and Network Security
Cryptography and Network Security
CLR-2: Presents the basic principles of public key cryptography, distinct uses of public key
cryptosystems.
CLR-3: Know the overview of the basic structure of cryptographic functions, Message
Authentication Codes, Understand the operation of SHA-512, HMAC, Digital Signature
To learn an overview of techniques for remote user authentication, Kerberos, Summarize
CLR-4: Web Security threats and Web traffic security approaches, overview of SSL & TLS.
Present an overview of electronic mail security
CLR-5: Provide an overview of IP Security, concept of security association, Intrusion Detection
Techniques
Course Outcome (s) (Cos):
At the end of this course, learners will be able to:
CO1 Explain various classical encryption techniques.
CO2 Understand block ciphers and write Symmetric key cryptographic algorithms.
Apply Cryptographic Hash Functions & and verify messages using well known signature
CO3
generation and verification algorithms.
CO4 Discuss User Authentication, Transport Layer Security & Email Security
CO5 Describe IP Security & Intrusion Detection Systems
CO-PO Mapping
POs PSOs
COs PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1
2
CO1 3 - - - - - - 2 - - - 2 - -
CO2 3 2 3 - - - - 2 - - - 2 3 -
CO3 3 2 - - - - - 1 - - - 2 3 -
CO4 2 - - - - - - 3 - - - 2 - -
CO5 2 - - - - - - 2 - - - 2 - -
B.Tech - Artificial Intelligence and Data Science Curriculum and Syllabus | 2018 1
Regulation
CO
2.6 2 3 0 0 0 0 5 0 0 0 2 3 0
(Avg)
B.Tech - Artificial Intelligence and Data Science Curriculum and Syllabus | 2018 2
Regulation
UNIT I Classical Encryption Techniques 2
Introduction: Security attacks, services & mechanisms, Symmetric Cipher Model, Substitution
Techniques, Transportation Techniques, Cyber threats and their defense( Phishing Defensive
measures, web based attacks, SQL injection & Defense techniques), Buffer overflow & format
string vulnerabilities, TCP session hijacking(ARP attacks, route table modification) UDP hijacking
( man-in-the-middle attacks).
UNIT II Block Ciphers & Symmetric Key Cryptography 4
Traditional Block Cipher Structure, DES, Block Cipher Design Principles, AES-Structure,
Transformation functions, Key Expansion, Blowfish, CAST-128, IDEA, Block Cipher Modes of
Operations
UNIT III Number Theory & Asymmetric Key Cryptography 4
Number Theory: Prime and Relatively Prime Numbers, Modular Arithmetic, Fermat’s and Euler’s
Theorems, The Chinese Remainder theorem, Discrete logarithms.
Public Key Cryptography: Principles, public key cryptography algorithms, RSA Algorithms, Diffie
Hellman Key Exchange, Elgamal encryption & decryption, Elliptic Curve Cryptography.
1 Cryptography & Network Security: Principles and Practices, William Stallings, PEA, Sixth
edition.
Introduction to Computer Networks & Cyber Security, Chwan Hwa Wu, J.David Irwin,
2
CRC press
3 Hack Proofing your Network, Russell, Kaminsky, Forest Puppy, Wiley Dreamtech.
Web References
1 https://www.geeksforgeeks.org/cryptography-and-its-types/
2 https://nptel.ac.in/courses/106105031
B.Tech - Artificial Intelligence and Data Science Curriculum and Syllabus | 2018 3
Regulation
B.Tech - Artificial Intelligence and Data Science Curriculum and Syllabus | 2018 4
Regulation