0% found this document useful (0 votes)
66 views2 pages

2019-11-21.10.49.10-Cryptography and Network Security (Syllabus)

The document outlines the syllabus for a course on Cryptography and Network Security. The course covers 5 units: an introduction to cryptography theories and techniques; symmetric key cryptography including algorithms like DES and AES; public key cryptography including RSA and elliptic curve cryptography; message authentication and integrity including hash functions and digital signatures; and security practices like encryption of email and firewalls. The objectives of the course are to understand cryptography concepts and approaches to build security mechanisms for computer networks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views2 pages

2019-11-21.10.49.10-Cryptography and Network Security (Syllabus)

The document outlines the syllabus for a course on Cryptography and Network Security. The course covers 5 units: an introduction to cryptography theories and techniques; symmetric key cryptography including algorithms like DES and AES; public key cryptography including RSA and elliptic curve cryptography; message authentication and integrity including hash functions and digital signatures; and security practices like encryption of email and firewalls. The objectives of the course are to understand cryptography concepts and approaches to build security mechanisms for computer networks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

AllAbtEngg.

com
For Questions, Notes, Syllabus & Results
CS8792 CRYPTOGRAPHY AND NETWORK SECURITY SYLLABUS
LTPC3003
OBJECTIVES:
To understand Cryptography Theories, Algorithms and Systems.
To understand necessary Approaches and Techniques to build protection mechanisms in
order to secure computer networks.

UNIT I INTRODUCTION 9
Security trends - Legal, Ethical and Professional Aspects of Security, Need for Security at
Multiple levels, Security Policies - Model of network security – Security attacks, services and
mechanisms – OSI security architecture – Classical encryption techniques: substitution
techniques, transposition techniques, steganography- Foundations of modern cryptography:
perfect security – information theory – product cryptosystem – cryptanalysis.

UNIT II SYMMETRIC KEY CRYPTOGRAPHY 9


MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures – Modular
arithmetic-Euclid’s algorithm- Congruence and matrices - Groups, Rings, Fields- Finite fields-
SYMMETRIC KEY CIPHERS: SDES – Block cipher Principles of DES – Strength of DES –
Differential and linear cryptanalysis - Block cipher design principles – Block cipher mode of
operation – Evaluation criteria for AES – Advanced Encryption Standard - RC4 – Key
distribution.

UNIT III PUBLIC KEY CRYPTOGRAPHY 9


MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing –
Factorization – Euler’s totient function, Fermat’s and Euler’s Theorem - Chinese Remainder
Theorem – Exponentiation and logarithm - ASYMMETRIC KEY CIPHERS: RSA cryptosystem
– Key distribution – Key management – Diffie Hellman key exchange - ElGamal cryptosystem
– Elliptic curve arithmetic-Elliptic curve cryptography.

UNIT IV MESSAGE AUTHENTICATION AND INTEGRITY 9


Authentication requirement – Authentication function – MAC – Hash function – Security of
hash function and MAC – SHA –Digital signature and authentication protocols – DSS- Entity
Authentication: Biometrics, Passwords, Challenge Response protocols- Authentication
applications - Kerberos, X.509

UNIT V SECURITY PRACTICE AND SYSTEM SECURITY 9


Electronic Mail security – PGP, S/MIME – IP security – Web Security – SYSTEM SECURITY:
Intruders – Malicious software – viruses – Firewalls.

TEXT BOOK:
1. William Stallings, Cryptography and Network Security: Principles and Practice, PHI 3rd
Edition, 2006.

REFERENCES:
1. C K Shyamala, N Harini and Dr. T R Padmanabhan: Cryptography and Network Security,
Wiley India Pvt. Ltd

www.AllAbtEngg.com www.PhotoShip.Net www.SmartPoet.Net


AllAbtEngg.com
For Questions, Notes, Syllabus & Results
2. BehrouzA. Foruzan, Cryptography and Network Security, Tata McGraw Hill 2007.
3. Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: PRIVATE
Communication in a PUBLIC World, Prentice Hall, ISBN 0-13-046019-2

www.AllAbtEngg.com www.PhotoShip.Net www.SmartPoet.Net

You might also like