0% found this document useful (0 votes)
49 views2 pages

Minor Acp(Network Security)

Uploaded by

Lone Azaan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views2 pages

Minor Acp(Network Security)

Uploaded by

Lone Azaan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

BACHELOR WITH APPLIED COMPUTING AS MINOR

3rd SEMESTER
(FOR STUDENTS WITH MAJOR IN COMPUTER APPLICATIONS / INFORMATION TECHNOLOGY)
ACP323N: APPLIED COMPUTING _ CRYPTOGRAPHY & NETWORK SECURITY
CREDITS: THEORY (4) PRACTICAL (2)
LEARNING OUTCOMES
• Understand the fundamentals of cryptography, including classical ciphers, symmetric key cryptography, and
public key cryptography.
• Apply cryptographic techniques to ensure message authentication and integrity.
• Comprehend the principles and applications of digital signatures.
• Understand the fundamental principles of network security and implement network security mechanisms.
• Analyse and mitigate network security threats and employ network security tools and techniques.
• Use Cryptool 2 to implement, analyse and understand various cryptographic procedures.

THEORY (4 CREDITS, 60 HOURS) MAX. MARKS: 100 MIN. MARKS: 36

UNIT-I (15 hours)

Introduction to Cryptography: History of cryptography, Basics of cryptography, Types of cryptographic algorithms,


Security implications of cryptography. Classical Ciphers: Caesar Cipher, Mono-alphabetic cipher, Hill cipher, Poly-
alphabetic cipher (Vegnere Cipher), One time pad, Transposition Cipher (Rail-fence Cipher). Introduction to Number
Theory: Prime Number Generation and Testing for Primality, Fermat’s and Euler’s Theorems. Symmetric Key
Cryptography: Principles of symmetric key cryptography, Encryption and decryption algorithms, Claude Shannon’s
Theory of Diffusion and Confusion, Avalanche Effect, Feistel Cipher, Common symmetric key algorithms (e.g., DES,
Triple DES, AES),

UNIT-II (15 HOURS)

Public Key Cryptography: Principles of public key cryptography, Key pair generation and Diffie-Hellman key
exchange, Common public key algorithms (e.g., RSA)
Authentication Schemes and Hash Functions: Message Authentication, Introduction to digital signatures, Digital
signature algorithms. (RSA). Introduction to hash functions, Properties of hash functions, Common hash algorithms
(e.g., SHA1), Cryptographic Hash Applications: Password hashing and storage, Message Authentication Code (MAC)

UNIT-III (15 HOURS)

Network Security Principles and Protocols: Defining network security, understanding the CIA triad (Confidentiality,
Integrity, Availability) in network security, identifying common network security threats and vulnerabilities.
Introduction to network security protocols, including IPsec (Internet Protocol Security), SSL (Secure Sockets Layer).
Exploring network security mechanisms such as firewalls, intrusion detection systems (IDS. Investigating the
application of network security principles and protocols in various scenarios, including email security.

UNIT-IV (15 HOURS)

Network Security Threats and Mitigation Strategies: Understanding various types of network attacks, including
denial-of-service (DoS) attacks, distributed denial-of-service (DDoS) attacks, man-in-the-middle (MitM) attacks,
spoofing attacks, and malware attacks. Implementing network security mitigation strategies, including network
hardening, vulnerability scanning and patching. Exploring network security tools and techniques, such as network
sniffers for network traffic analysis.

REFERENCES:

• William Stallings, "Cryptography and Network Security: Principles and Practice," Pearson. Eigth edition.
2023.
• Sarhan M. Musa, “Network Security and Cryptography,” Mercury Learning and Information, 2nd edition.
2022.
• Andreas Antonopoulos, “Mastering Bitcoin: Unlocking Digital Cryptocurrencies” O’reilly, Second Eduction.
• Jan L. Harrington, "Network Security: A practical Approach," Morgan Kaufmann Publishers.
• Roberta Bragg, Mark Phodes-Ousley, Keith Strassberg, “Network Security The Complete Reference,”
McGraw Hill Publications.
PRACTICAL (2 CREDIT)

1. Overview of Cryptool 2 and its features, Hashing (SHA1), (SHA2), (MD5)


2. Installation, and setup of Cryptool 2 environment. Download link
https://www.cryptool.org/en/ct2/downloads.
3. Use Cryptool 2 to demonstrate the principles of classical ciphers such as Caesar Cipher,
4. Use Cryptool 2 to demonstrate the principles of classical ciphers such as Hill cipher
5. Use Cryptool 2 to demonstrate the principles of classical ciphers such as Vigenere Cipher.
6. Use Cryptool 2 to encrypt and decrypt messages using Feistel Cipher (FEAL).
7. Explore the processes of encryption and decryption in DES using Cryptool 2.
8. Explore the processes of encryption and decryption in AES using Cryptool 2.
9. Engage in experiments with public key algorithms (RSA) using Cryptool 2.
10. Use the “check password strength” tool in Cryptool 2 to assess and analyse the strength of a
password.
11. Conduct experiments on hashing techniques (SHA-1) and the verification of hash values using
Cryptool 2.
12. Conduct experiments on hashing techniques (SHA-2) and the verification of hash values using
Cryptool 2
13. Setup and configure Windows Firewall for filtering. Explain its role in network security management
on Windows-based systems.
14. Overview of wireshark tool,
15. Installation, and setup of Wireshark
16. Use Wireshark to capture and analyse network traffic. Identify patterns and anomalies, and discuss
the role of network forensics in incident response.
17. Use Wireshark to capture and analyse network traffic on a test network. Identify different protocols,
analyse packet headers, and discuss the significance of each.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy