0% found this document useful (0 votes)
38 views2 pages

CNS Syllabus

The document outlines the objectives and content of a cryptography course. The objectives are to understand cryptography theories, algorithms, systems and approaches to secure computer networks. The course content includes introduction to cryptography concepts, symmetric and asymmetric key ciphers like DES, AES, RSA and algorithms like SHA. It also covers hash functions, digital signatures, key management, network and internet security topics like PGP, S/MIME, IP security and wireless network security. The lab component involves experiments on encryption/decryption algorithms like Caesar cipher, DES, RSA and Diffie-Hellman key exchange.

Uploaded by

lekha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views2 pages

CNS Syllabus

The document outlines the objectives and content of a cryptography course. The objectives are to understand cryptography theories, algorithms, systems and approaches to secure computer networks. The course content includes introduction to cryptography concepts, symmetric and asymmetric key ciphers like DES, AES, RSA and algorithms like SHA. It also covers hash functions, digital signatures, key management, network and internet security topics like PGP, S/MIME, IP security and wireless network security. The lab component involves experiments on encryption/decryption algorithms like Caesar cipher, DES, RSA and Diffie-Hellman key exchange.

Uploaded by

lekha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

OBJECTIVES:

l To understand Cryptography Theories, Algorithms and Systems.


l To understand necessary Approaches and Techniques to build protection
mechanisms in order to secure computer networks.
l To understand Cryptography Theories, Algorithms and Systems.
UNIT I INTRODUCTION 9
Introduction, The need for security, Security approaches, Principles of security, Types of
Security attacks, Security services, Security Mechanisms, A model for Network Security
(Text 1) Cryptography Concepts and Techniques: Introduction, plain text and cipher text,
substitution techniques, transposition techniques, encryption and decryption, symmetric and
asymmetric key cryptography, steganography, key range and key size, possible types of
attacks.(Text 2)
UNIT II: SYMMETRIC KEY CIPHERS 9
Block Cipher principles, DES, AES, Blowfish, RC5, IDEA, Block cipher operation(Text 1),
Stream ciphers, RC4. Asymmetric key Ciphers: Principles of public key cryptosystems, RSA
algorithm, Elgamal Cryptography, Diffie-Hellman Key Exchange, Knapsack Algorithm.
(Text2)
UNIT III CRYPTOGRAPHIC HASH FUNCTIONS 9 (Text 1)
Message Authentication, Secure Hash Algorithm (SHA-512), Message authentication codes:
Authentication requirements, HMAC, CMAC, Digital signatures, Elgamal Digital Signature
Scheme. Key Management and Distribution: Symmetric Key Distribution Using Symmetric
& Asymmetric Encryption, Distribution of Public Keys, Kerberos, X.509 Authentication
Service, Public – Key Infrastructure.(Text 1)
UNIT IV NETWORK AND INTERNET SECURITY 9
Electronic Mail security – PGP, S/MIME – IP security – Web Security - SYSTEM
SECURITY: Intruders – Malicious software – viruses – Firewalls - Network Access Control
and Cloud Security – Transport Level Security – Wireless Network Security – Email Security
– IP Security.
UNIT V LAB COMPONENT – LIST OF EXPERIMENTS 24
1. Write a C program that contains a string (char pointer) with a value \Hello World’. The
program should XOR each character in this string with 0 and displays the result.
2. Write a C program that contains a string (char pointer) with a value \Hello World’. The
program should AND or and XOR each character in this string with 127 and display the
result.
3. Write a Java program to perform encryption and decryption using the following
algorithms:
a)Ceaser Cipher b) Substitution Cipher c) Hill Cipher
4. Write a Java program to implement the DES algorithm logic
5. Write a Java program to implement RSA Algoithm
6. Implement the Diffie-Hellman Key Exchange mechanism using HTML and JavaScript.
Consider the end user as one of the parties (Alice) and the JavaScript application as other
party (bob).

You might also like