100% found this document useful (1 vote)
2K views29 pages

CS8792 - CNS

This document outlines the course CS8792 Cryptography and Network Security. It includes prerequisites of computer networks, discrete mathematics, number theory, and ethics of hacking. The need for network security is discussed due to billions lost annually to hacking and theft of important data. Cryptography is introduced as "hidden writing" used to protect information. The document then covers basic terminology, security principles, attacks, classifications of cryptography, symmetric and asymmetric key cryptography, digital signatures, and WhatsApp security. The syllabus outlines 5 units covering introduction, symmetric cryptography, public key cryptography, message authentication and integrity, and security practice. References for further reading are also provided.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
2K views29 pages

CS8792 - CNS

This document outlines the course CS8792 Cryptography and Network Security. It includes prerequisites of computer networks, discrete mathematics, number theory, and ethics of hacking. The need for network security is discussed due to billions lost annually to hacking and theft of important data. Cryptography is introduced as "hidden writing" used to protect information. The document then covers basic terminology, security principles, attacks, classifications of cryptography, symmetric and asymmetric key cryptography, digital signatures, and WhatsApp security. The syllabus outlines 5 units covering introduction, symmetric cryptography, public key cryptography, message authentication and integrity, and security practice. References for further reading are also provided.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 29

CS8792

CRYPTOGRAPHY AND NETWORK


SECURITY
IV CSE A

Mrs. C. P. Jetlin
Assistant Professor
Department of CSE
Prerequisite
 Computer Networks

 Discrete Mathematics

 Number Theory

 Analysis of Algorithms

 Ethics of hacking
Need of Network Security

 According to FBI statistics result up to five billion dollars

is lost each year due to black holes

 Loss of important data. e.g. Credit Card, ATM Card

 Confidential information of business have been stolen by

competitors. e.g. ICICI Vs HDFC

 Important data stolen from military


What is Cryptography??
Kryptos Hidden
Graphien Writing

“Hidden Writing”
Mainly used to protect Information.
What is Cryptography??
What is Cryptography??
Enters Cryptography
Basic Terminologies

 Plaintext- Readable Plain Message

 Cipher text- It is the result of encryption process

 Encryption- Plaintext  Cipher Text

 Decryption- Cipher Text  Plain Text

 Key - variable value


Security Principles
Classification of Security Attacks
Passive Attacks
Traffic Analysis
Passive Attacks
Release of Message contents
Active Attacks
Replay
Active Attacks
Modification
Active Attacks
Masquerade
Classification of Cryptography
Symmetric Key Cryptography
Asymmetric Key Cryptography

http://cobweb.cs.uga.edu/~dme/csci6300/Encry
ption/Crypto.html
Digital Signature
Watsapp Working
Watsapp Working
Syllabus
UNIT I INTRODUCTION 9
Security trends - Legal, Ethical and Professional Aspects of Security, Need for Security
at Multiple levels, Security Policies - Model of network security – Security attacks,
services and mechanisms – OSI security architecture – Classical encryption techniques:
substitution techniques, transposition techniques, steganography- Foundations of
modern cryptography: perfect security – information theory – product cryptosystem –
cryptanalysis.

UNIT II SYMMETRIC KEY CRYPTOGRAPHY 9


MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures -
Modular arithmetic-Euclid‟s algorithm- Congruence and matrices - Groups, Rings,
Fields- Finite fields- SYMMETRIC KEY CIPHERS: SDES – Block cipher Principles
of DES – Strength of DES – Differential and linear cryptanalysis - Block cipher design
principles – Block cipher mode of operation – Evaluation criteria for AES – Advanced
Encryption Standard - RC4 – Key distribution.
Syllabus
UNIT III PUBLIC KEY CRYPTOGRAPHY 9
MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality
Testing – Factorization – Euler‘s totient function, Fermat‘s and Euler‘s Theorem -
Chinese Remainder Theorem – Exponentiation and logarithm - ASYMMETRIC KEY
CIPHERS: RSA cryptosystem – Key distribution – Key management – Diffie Hellman
key exchange - ElGamal cryptosystem – Elliptic curve arithmetic-Elliptic curve
cryptography

UNIT IV MESSAGE AUTHENTICATION AND INTEGRITY 9


Authentication requirement – Authentication function – MAC – Hash function –
Security of hash function and MAC – SHA –Digital signature and authentication
protocols – DSS- Entity Authentication: Biometrics, Passwords, Challenge Response
protocols- Authentication applications - Kerberos, X.509
Syllabus
UNIT V SECURITY PRACTICE AND SYSTEM SECURITY 9

Electronic Mail security – PGP, S/MIME – IP security – Web Security -


SYSTEM SECURITY: Intruders – Malicious software – viruses – Firewalls.
Text Books
William Stallings, Cryptography and Network
Security: Principles and Practice, PHI 3rd
Edition, 2006.
References
1. C K Shyamala, N Harini and Dr. T R Padmanabhan:
Cryptography and Network Security, Wiley India
Pvt.Ltd

2. BehrouzA.Foruzan, Cryptography and Network


Security, Tata McGraw Hill 2007.

3. Charlie Kaufman, Radia Perlman, and Mike Speciner,


Network Security: PRIVATE Communication in a
PUBLIC World, Prentice Hall, ISBN 0-13-046019-2
External Links and References
1. https://nptel.ac.in/courses/106105162/
2. https://freevideolectures.com/course/3027/cryptograp
hy-and-network-security
3. https://www.btechguru.com/courses--nptel--computer
-science-and-engineering--cryptography-and-network
-security-video-lecture--cse--CE10055V.html
4. http://cse.iitkgp.ac.in/~debdeep/courses_iitkgp/Crypt
o/index.htm
5. https://www.edx.org/course/quantum-cryptography-0
CS8792
CRYPTOGRAPHY AND NETWORK SECURITY

You might also like