Cryptography and Network Security
Cryptography and Network Security
Course Outcome
• Analyze the vulnerabilities in any computing system and hence be able to design a security
solution.
• Identify the security issues in the network and resolve it.
• Evaluate security mechanisms using rigorous approaches, including theoretical.
• Compare and Contrast different IEEE standards and electronic mail security.
Course Content
Unit–I
Introduction-computer security concepts, attacks, security services, security mechanisms; Classical
encryption techniques-symmetric cipher models, substitution techniques, transposition techniques,
rotor machines
Unit–II
Symmetric ciphers-Block cipher principles; DES-Algorithm, strengths and weaknesses of DES,
attacks on DES and defense, multiple encryptions; Asymmetric ciphers-Essential mathematics,
public key cryptography.
Unit–III
RSA, Diffie Hellman key exchange, random number generation, Data integrity and authentication
Hash functions; MAC; Digital signatures;
Unit–IV
Key management; Authentication, Web and system security, Web security; IP security; E -mail
security; System security-intruders, malicious software, firewalls
References Books
1. Cryptography and Network Security - Principles and Practice, William Stallings, PEARSON
2. Cryptography and Network Security, AtulKahate, Tata McGraw Hill