KCS074 Cryptography & Network Security
Course Outcome ( CO) Bloom’s Knowledge Level (KL)
At the end of course , the student will be able to understand
Classify the symmetric encryption techniques and Illustrate various Public key cryptographic K2 , K3
CO 1 techniques.
Understand security protocols for protecting data on networks and be able to digitally sign K1 , K2
CO 2 emails and files.
Understand vulnerability assessments and the weakness of using passwords for authentication K4
CO 3
Be able to perform simple vulnerability assessments and password audits K3
CO 4
Summarize the intrusion detection and its solutions to overcome the attacks. K2
CO 5
DETAILED SYLLABUS 3-0-0
Unit Proposed
Topic
Lecture
Introduction to security attacks, services and mechanism, Classical encryption techniques-
substitution ciphers and transposition ciphers, cryptanalysis, steganography, Stream and block
I 08
ciphers. Modern Block Ciphers: Block ciphers principles, Shannon’s theory of confusion and
diffusion, fiestal structure, Data encryption standard(DES), Strength of DES, Idea of differential
cryptanalysis, block cipher modes of operations, Triple DES
Introduction to group, field, finite field of the form GF(p), modular arithmetic, prime and relative
prime numbers, Extended Euclidean Algorithm, Advanced Encryption Standard (AES) encryption
II 08
and decryptionFermat’s and Euler’s theorem, Primarily testing, Chinese Remainder theorem,
Discrete Logarithmic Problem,Principals of public key crypto systems, RSA algorithm, security of
RSA
Message Authentication Codes: Authentication requirements, authentication functions, message
authentication code, hash functions, birthday attacks, security of hash functions, Secure hash
III 08
algorithm (SHA) Digital Signatures: Digital Signatures, Elgamal Digital Signature Techniques,
Digital signature standards (DSS), proof of digital signature algorithm,
Key Management and distribution: Symmetric key distribution, Diffie-Hellman Key Exchange,
IV 08
Public key distribution, X.509 Certificates, Public key Infrastructure. Authentication Applications:
Kerberos, Electronic mail security: pretty good privacy (PGP), S/MIME.
IP Security: Architecture, Authentication header, Encapsulating security payloads, combining
V security associations, key management. Introduction to Secure Socket Layer, Secure electronic, 08
transaction (SET) System Security: Introductory idea of Intrusion, Intrusion detection, Viruses and
related threats, firewalls
Text books: 1. William Stallings, “Cryptography and Network Security: Principals and Practice”, Pearson Education. 2.
Behrouz A. Frouzan: Cryptography and Network Security, Tata McGraw Hill . 3. C K Shyamala, N Harini, Dr.
T.R.Padmnabhan Cryptography and Security ,Wiley
4. Bruce Schiener, “Applied Cryptography”. John Wiley & Sons
5. Bernard Menezes,” Network Security and Cryptography”, Cengage Learning.
6. AtulKahate, “Cryptography and Network Security”, Tata McGraw Hill
KCS713 Cloud Computing
Course Outcome ( CO) Bloom’s Knowledge Level (KL)
At the end of course , the student will be able to understand
CO 1 Describe architecture and underlying principles of cloud computing. K3
CO 2 Explain need, types and tools of Virtualization for cloud. K 3, K 4
CO 3 Describe Services Oriented Architecture and various types of cloud services. K 2, K 3
Explain Inter cloud resources management cloud storage services and their providers Assess K 2, K 4
CO 4
security services and standards for cloud computing.
CO 5 Analyze advanced cloud technologies. K 3, K 6
DETAILED SYLLABUS 3-1-0
Proposed
Unit Topic
Lecture
Introduction To Cloud Computing: Definition of Cloud – Evolution of Cloud Computing –
I Underlying Principles of Parallel and Distributed Computing – Cloud Characteristics – Elasticity in 08
Cloud – On-demand Provisioning.
Cloud Enabling Technologies Service Oriented Architecture: REST and Systems of Systems –
Web Services – Publish, Subscribe Model – Basics of Virtualization – Types of Virtualization –
II 08
Implementation Levels of Virtualization – Virtualization Structures – Tools and Mechanisms –
Virtualization of CPU – Memory – I/O Devices –Virtualization Support and Disaster Recovery.
Cloud Architecture, Services And Storage: Layered Cloud Architecture Design – NIST Cloud
Computing Reference Architecture – Public, Private and Hybrid Clouds – laaS – PaaS – SaaS –
III Architectural Design Challenges – Cloud Storage – Storage-as-a-Service – Advantages of Cloud 08
Storage – Cloud Storage Providers – S3.
Resource Management And Security In Cloud: Inter Cloud Resource Management – Resource
Provisioning and Resource Provisioning Methods – Global Exchange of Cloud Resources –
IV Security Overview – Cloud Security Challenges – Software-as-a-Service Security – Security 08
Governance – Virtual Machine Security – IAM – Security Standards.
Cloud Technologies And Advancements Hadoop: MapReduce – Virtual Box — Google App
V Engine – Programming Environment for Google App Engine –– Open Stack – Federation in the 08
Cloud – Four Levels of Federation – Federated Services and Applications – Future of Federation.
Text books:
1. Kai Hwang, Geoffrey C. Fox, Jack G. Dongarra, “Distributed and Cloud Computing, From Parallel Processing to the
Internet of Things”, Morgan Kaufmann Publishers, 2012.
2. Rittinghouse, John W., and James F. Ransome, ―Cloud Computing: Implementation, Management and Security,
CRC Press, 2017.
3. Rajkumar Buyya, Christian Vecchiola, S. ThamaraiSelvi, ―Mastering Cloud Computing, Tata Mcgraw Hill, 2013.
4. Toby Velte, Anthony Velte, Robert Elsenpeter, “Cloud Computing – A Practical Approach, Tata Mcgraw Hill, 2009.
5. George Reese, “Cloud Application Architectures: Building Applications and Infrastructure in the Cloud:
Transactional Systems for EC2 and Beyond (Theory in Practice), O’Reilly, 2009.
KCS354/ KCS554/KCS752 Mini Project or Internship Assessment
Course Outcome ( CO) Bloom’s Knowledge Level (KL)
At the end of course , the student will be able to understand
Developing a technical artifact requiring new technical skills and effectively utilizing a new K4 , K5
CO 1
software tool to complete a task
Writing requirements documentation, Selecting appropriate technologies, identifying and K5 , K6
CO 2
creating appropriate test cases for systems.
Demonstrating understanding of professional customs & practices and working with K4 , K5
CO 3
professional standards.
CO 4 Improving problem-solving, critical thinking skills and report writing. K4 , K5
Learning professional skills like exercising leadership, behaving professionally, behaving K2, K4
CO 5 ethically, listening effectively, participating as a member of a team, developing appropriate
workplace attitudes.
KCS753/ KCS 851 Project
Course Outcome ( CO) Bloom’s Knowledge Level (KL)
At the end of course , the student will be able to understand
Analyze and understand the real life problem and apply their knowledge to get programming K4 , K5
CO 1
solution.
Engage in the creative design process through the integration and application of diverse K4 , K5
CO 2
technical knowledge and expertise to meet customer needs and address social issues.
Use the various tools and techniques, coding practices for developing real life solution to the K5 , K6
CO 3
problem.
Find out the errors in software solutions and establishing the process to design maintainable K4 , K5
CO 4
software applications
CO 5 Write the report about what they are doing in project and learning the team working skills K 5, K6