CY5001 - Information Security
CY5001 - Information Security
CY5001 - Information Security
B.Tech.
Semester V
INFORMATION SECURITY
CY5001
Theory Practical
Examination Examination
Marks Marks
Subject Total
Subject Title
Code Marks
Internal External CIE
Course Outcomes:
Upon completion of the course, the student shall be able to
CO1: Distinguish between the three major goals of information security: confidentiality,
integrity and authentication and able to identify type of security attacks.
CO2: Solve and analyze classical encryption techniques used.
CO3: Evaluate and illustrate various symmetric key concepts used as security
mechanisms.
CO4: Solve and apply relavant mathematical theorem while integrating security
mechanisms.
CO5: Evaluate and illustrate various public key cryptographic concepts along with key
distribution techniques.
CO6: Discuss and assess various solutions to provide authentication, integrity,
confidentiality and digital signatures.
Sr.
Information Security (Practical) Hours
No.
1 Implementation of caesar cipher and brute force attack. 4
Text books:
1. William Stallings - “Cryptography and Network Security” - 6th Edition, Pearson
publication.
Reference book:
1. Behrouz Forouzan, Debdeep Mukhopadhyay – “Cryptography and Network
Security”, McGraw Hill education.
2. Dhiren Patel – “Information Security: Theory and Practice”, PHI publication.
3. Atul Kahate – “Cryptography and Network Security”, McGraw Hill education.
4. Bernard Menezes – “Network Security and Cryptography” – Cengage learning.
5. Bruce Schneier – “Applied Cryptography: Protocols, Algorithms and Source Code
in C”, John Wiley & Sons.
3 Block ciphers √
4 Number theory √
Programme Outcomes:
Programme
Course Outcomes
Outcomes
CO1 CO2 CO3 CO4 CO5 CO6
PO1 ✓ ✓ ✓ ✓
PO2 ✓ ✓ ✓ ✓ ✓ ✓
PO3 ✓ ✓ ✓ ✓ ✓ ✓
PO4 ✓ ✓ ✓
PO5 ✓ ✓ ✓
PO6
PO7
PO8
PO9
PO10
PO11
PO12