0% found this document useful (0 votes)
4 views1 page

Cryptography and Network Security

The document outlines a course on Cryptography and Network Security, focusing on analyzing vulnerabilities, identifying network security issues, and evaluating security mechanisms. It covers classical and symmetric encryption techniques, asymmetric ciphers, key management, and various security protocols. The course includes references to key textbooks for further study.

Uploaded by

shivakumare793
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views1 page

Cryptography and Network Security

The document outlines a course on Cryptography and Network Security, focusing on analyzing vulnerabilities, identifying network security issues, and evaluating security mechanisms. It covers classical and symmetric encryption techniques, asymmetric ciphers, key management, and various security protocols. The course includes references to key textbooks for further study.

Uploaded by

shivakumare793
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Cryptography and Network Security (3:1:0)

Course Outcome

• Analyze the vulnerabilities in any computing system and hence be able to design a security
solution.
• Identify the security issues in the network and resolve it.
• Evaluate security mechanisms using rigorous approaches, including theoretical.
• Compare and Contrast different IEEE standards and electronic mail security.

Course Content

Unit–I
Introduction-computer security concepts, attacks, security services, security mechanisms; Classical
encryption techniques-symmetric cipher models, substitution techniques, transposition techniques,
rotor machines

Unit–II
Symmetric ciphers-Block cipher principles; DES-Algorithm, strengths and weaknesses of DES,
attacks on DES and defense, multiple encryptions; Asymmetric ciphers-Essential mathematics,
public key cryptography.

Unit–III
RSA, Diffie Hellman key exchange, random number generation, Data integrity and authentication
Hash functions; MAC; Digital signatures;

Unit–IV
Key management; Authentication, Web and system security, Web security; IP security; E -mail
security; System security-intruders, malicious software, firewalls

References Books
1. Cryptography and Network Security - Principles and Practice, William Stallings, PEARSON
2. Cryptography and Network Security, AtulKahate, Tata McGraw Hill

You might also like