0% found this document useful (0 votes)
104 views1 page

CS8792 Cryptography and Network Security Syllabus

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
104 views1 page

CS8792 Cryptography and Network Security Syllabus

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

www.edubuzz360.

com

CS8792 Cryptography And Network


Security
UNIT I INTRODUCTION
Security trends - Legal, Ethical and Professional Aspects of Security, Need for Security at Multiple
levels, Security Policies - Model of network security – Security attacks, services and mechanisms –
OSI security architecture – Classical encryption techniques: substitution techniques, transposition
techniques, steganography- Foundations of modern cryptography: perfect security – information
theory – product cryptosystem – cryptanalysis.

UNIT II SYMMETRIC KEY CRYPTOGRAPHY


MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures - Modular
arithmetic-Euclid‟s algorithm- Congruence and matrices - Groups, Rings, Fields- Finite fields-
SYMMETRIC KEY CIPHERS: SDES – Block cipher Principles of DES – Strength of DES –
Differential and linear cryptanalysis - Block cipher design principles – Block cipher mode of operation
– Evaluation criteria for AES – Advanced Encryption Standard - RC4 – Key distribution.

UNIT III PUBLIC KEY CRYPTOGRAPHY


MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing –
Factorization – Euler‘s totient function, Fermat‘s and Euler‘s Theorem - Chinese Remainder
Theorem – Exponentiation and logarithm - ASYMMETRIC KEY CIPHERS: RSA cryptosystem – Key
distribution – Key management – Diffie Hellman key exchange - ElGamal cryptosystem – Elliptic
curve arithmetic-Elliptic curve cryptography.

UNIT IV MESSAGE AUTHENTICATION AND INTEGRITY


Authentication requirement – Authentication function – MAC – Hash function – Security of hash
function and MAC – SHA –Digital signature and authentication protocols – DSS- Entity
Authentication: Biometrics, Passwords, Challenge Response protocols- Authentication applications -
Kerberos, X.509

UNIT V SECURITY PRACTICE AND SYSTEM SECURITY


Electronic Mail security – PGP, S/MIME – IP security – Web Security - SYSTEM SECURITY:
Intruders – Malicious software – viruses – Firewalls.

https://play.google.com/store/apps/details?id=com.sss.edubuzz360

You might also like