0% found this document useful (0 votes)
18 views3 pages

CNS Course-Outline - Marked Ja Porano Hoyache

Uploaded by

Nïloy Ft Aminul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views3 pages

CNS Course-Outline - Marked Ja Porano Hoyache

Uploaded by

Nïloy Ft Aminul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

CSE4231: Cryptography and Network Security

Recommended Book for Cryptography


Applied Cryptography, Second Edition: Protocols, Algorithms, and Source Code in C
Author(s):
Bruce Schneier
Publisher:
John Wiley & Sons, Inc.

Chapter 1_Foundations:
Terminology, Symmetric Algorithm, Public-key Algorithm, Cryptanalysis, Security of an
Algorithm, Other Cryptanalytic Attack, Substitution Cipher and Transposition Cipher, Double
Transposition Cipher, ONE-TIME PADS.

Chapter 2_Protocol Building Block:


Introduction to Protocols, Communications Using Symmetric Cryptography, One Way
Functions, Communications using public key cryptography, Hybrid Cryptosystems, Digital
Signature, Signing Documents with Symmetric Cryptosystems and an Arbitrator, Signing
Documents with Public-key Cryptography, Signing Documents and Timestamps, Digital
Signatures with Encryption.

Chapter 7_Key Length:


Symmetric Key Length, Time and Cost estimates of Brute-force attack, Software
Crackers, Public-key key Length, Birthday Attacks Against One-way Hash Functions.

Chapter 8_Key Management:


Generating Keys, Reduced keyspaces, Poor key choice, Random keys, Pass Phrases,
Transferring Keys, Key Distribution in Large Network, Verifying Keys, Updating Keys, Storing
Keys, Lifetime of Keys, Destroying Keys, Public Key Management.

Chapter 11_Mathematical Background:


Number Theory, Greatest Common Divisor, Inverses Modulo a Number, Prime Number
Generation: Lehmann and Robin-Miller, Practical Considerations.

Chapter 12_Data Encryption Standard (DES):


Development of the Standard, Description of DES, Outline of the Algorithm, The Initial
Permutation, The Key Transformation, The Expansion Permutation, The S-box Substitution, P-
Box Permutation, The Final Permutation, Decryption of DES, DES Variants.

Chapter 14_Still Other Block Cipher:


RC5.
Chapter 18_One-way Hash Functions:
Background, Length of One-Way Hash Functions, MD4, MD5, SHA.

Chapter 19_Public Key Algorithm:


Background, Security of a public key Algorithm, RSA, Speed of RSA, Security of RSA.
Chapter 20_Public Key Digital Signature Algorithm:
Digital Signature Algorithm.

Chapter 24_Example Implementations:


Kerberos, The Kerberos Model, Kerberos Authentication steps, How Kerberos Works,
Credentials, Kerberos V.5 Messages, Getting Initial Ticket, Getting Server Tickets, Requesting a
Service, Kerberos V.4, Security of Kerberos,

Recommended Book for Network Security


Cryptography and Network Security Principles and Practice
Author(s):
W. Stallings
Publisher:
Prentice Hall

Stallings_Chapter 10_Key Management; Other public-key Cryptosystem:


Key Management, Publicly Available Directory, Public-key Authority, Public-Key
Certificate, Diffie-Hellman Key Exchange.

Stallings_Chapter 15_Electric Mail Security:


Pretty Good Privacy, Operational Description, Authentication, Confidentiality,
Confidentiality and Authentication, Compression, E-mail Compatibility, Segmentation and
Reassembly.

Stallings_Chapter 16_IP Security:


IP Security Overview, Application of IPSec, Scenario of IPSec usage, Benefits of IPSec,
Routing Applications.

Stallings_Chapter 17_Web Security:


Web Security Consideration, Comparison of Threats on the Web, Web Security Threats,
Web Traffic Security Approaches.

Stallings_Chapter 18_Intruders:
Intruders, Intrusion Techniques.

Stallings_Chapter 19_Malicious Software:


Viruses and Related Threats, Taxonomy of Malicious Programs, Trap doors, Logic Bomb,
Trojan Horse, Zombie, The Nature of Viruses, Lifetime/Phases of Virus, Types of Viruses,
Worms.

Stallings_Chapter 20_Firewalls
Firewall Design Principles, Firewall Characteristics, Types of Firewalls, Packet filters.
Application-Level Gateway, Circuit-Level Gateway.
Lab Specification
Part 4, Even Semester, Session: 2018-2019, Examination 2020
CSE-4232P (Cryptography and Network Security Lab)

1. Suppose you are given a line of text as a plaintext, find out the corresponding Caesar Cipher (i.e.
character three to the right modulo 26). Then perform the reverse operation to get original plaintext.

2. Find out the Polygram Substitution Cipher of a given plaintext (Consider the block size of 3). Then
perform the reverse operation to get original plaintext.

3. Consider the plaintext “DEPARTMENT OF COMPUTER SCIENCE AND TECHNOLY UNIVERSITY OF


RAJSHAHI BANGLADESH”, find out the corresponding Transposition Cipher (Take width as input).
Then perform the reverse operation to get original plaintext.

4. Find out corresponding double Transposition Cipher of the above plaintext. Then perform the
reverse operation to get original plaintext.

5. You are supplied a file of large nonrepeating set of truly random key letter. Your job is to encrypt the
plaintext using ONE TIME PAD technique. Then perform the reverse operation to get original
plaintext.

6. Use the Lehmann algorithm to check whether the given number P is prime or not?

7. Use the Robin-Miller algorithm to check whether the given number P is prime or not?

8. Write a program to implement MD5 one way hash function.

9. Write a program to implement Secured Hash Algorithm (SHA) one way hash function.

10. Encrypt the plaintext message using RSA algorithm. Then perform the reverse operation to get
original plaintext.

11. Write a program to implement Diffie-Hellman Key Exchange.

(Md. Tohidul Islam)


Associate Professor
Dept. of CSE
University of Rajshahi

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy