0% found this document useful (0 votes)
69 views2 pages

CNS Syllabus

Uploaded by

Uday Saraswat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
69 views2 pages

CNS Syllabus

Uploaded by

Uday Saraswat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

BCSE1004: CRYPTOGRAPHY & NETWORK SECURITY

Objective: This Course focuses towards the introduction of network security using various cryptographic
algorithms and understanding network security applications and practical applications that have been
implemented and are in use to provide email and web security.

Credits:03 L-T-P-J:3-0-0-0

Module Teaching
No. Content Hours
Introduction: Introduction to Security Attacks, Services and Mechanism, Classical
Encryption Techniques-Substitution Ciphers and Transposition Ciphers,
Steganography, Stream and Block Ciphers, Cryptanalysis.
Symmetric Key Cryptosystems: Block Cipher Principles, Shannon's Theory of 20
Confusion and Diffusion, Data Encryption Standard(DES), Strength of DES, Triple DES,
Advance Encryption Standard (AES), Linear and Differential Cryptanalysis, Block
Ciphers Modes of Operation.
I Introduction to Number Theory: Modular Arithmetic, Prime and Relative Prime
Numbers, Primitive Roots, Fermat's and Euler's Theorem, Extended Euclidean
Algorithm, Chinese Remainder Theorem.
Algebraic Structures: Introduction to Group, Ring & Field of the Form GF(P).
Asymmetric Key Cryptosystems: RSA Cryptosystem, Attacks on RSA, Security of RSA,
Discrete Logarithm Problem, Elgamal Encryption Algorithm.
Hash Functions and Macs: Authentication Functions, Message Authentication Code,
Hash Functions, Birthday Attacks, Security of Hash Functions, Secure Hash Algorithm
[SHA-512).
Digital Signature: Digital Signatures, RSA Digital Signature Scheme, Elgamal Digital 21
Signature Techniques, Digital Signature Standards(DSS).
Key Management: Symmetric Key Distribution, Diffie Hellman Key Exchange
Algorithm.
II Public Key Distribution: X.509 Certificates, Public Key Infrastructure.
Authentication Applications and E-Mail Security: Kerberos, Pretty Good Privacy
(PGP), S/MIME.
IP Security and Web Security: IP Sec Architecture, Authentication Header,
Encapsulating Security Payloads, Combining Security Associations, Key Management,
Introduction to Secure Socket Layer, Transport Layer Security, Secure Electronic
Transaction (SET).
System Security: Introductory Idea of Intrusion, Intrusion Detection, Malicious
Programs, Firewalls.

Text Books:
• B. A. Forouzan, "Cryptography & Network Security", Special India Edition, Tata McGraw Hill,2007.
Reference Books:
• W. Stallings , "Cryptography and Network Security: Principles and Practices",4th Edition,
Pearson Education, 2009.
• Wenbo Mao, "Modern Cryptography: Theory and Practice", Prentice Hall,2003.
• Douglas Stinson, "Cryptography Theory and Practice", 2nd Edition, Chapman& Hall/CRC.
Outcome: After completion of course, the student will be able to:
• COl: Understands the basic concepts of cryptography.
• CO2: Apply the symmetric key concepts of DES and AES for securing data.
• CO3: Apply the concepts of number theory of Asymmetric key cryptosystem.
• CO4: Understand the concepts of hash function, MAC and digital signature for data integrity.
• CO5: Explain the symmetric and asymmetric key distribution techniques.
• CO6: Understand the concepts of security mechanism at TCP/IP layer.

DEPARTMENT OF COMPUTER ENGINEERING& APPLICATIONS, Institute of Engineering & Technology


Headr- ment
Co puter Eng e mg & ApplicatJont
lnsrnute of Engineering & Technolog,
GLA University, Mithura

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy