Minor Acp(Network Security)
Minor Acp(Network Security)
3rd SEMESTER
(FOR STUDENTS WITH MAJOR IN COMPUTER APPLICATIONS / INFORMATION TECHNOLOGY)
ACP323N: APPLIED COMPUTING _ CRYPTOGRAPHY & NETWORK SECURITY
CREDITS: THEORY (4) PRACTICAL (2)
LEARNING OUTCOMES
• Understand the fundamentals of cryptography, including classical ciphers, symmetric key cryptography, and
public key cryptography.
• Apply cryptographic techniques to ensure message authentication and integrity.
• Comprehend the principles and applications of digital signatures.
• Understand the fundamental principles of network security and implement network security mechanisms.
• Analyse and mitigate network security threats and employ network security tools and techniques.
• Use Cryptool 2 to implement, analyse and understand various cryptographic procedures.
Public Key Cryptography: Principles of public key cryptography, Key pair generation and Diffie-Hellman key
exchange, Common public key algorithms (e.g., RSA)
Authentication Schemes and Hash Functions: Message Authentication, Introduction to digital signatures, Digital
signature algorithms. (RSA). Introduction to hash functions, Properties of hash functions, Common hash algorithms
(e.g., SHA1), Cryptographic Hash Applications: Password hashing and storage, Message Authentication Code (MAC)
Network Security Principles and Protocols: Defining network security, understanding the CIA triad (Confidentiality,
Integrity, Availability) in network security, identifying common network security threats and vulnerabilities.
Introduction to network security protocols, including IPsec (Internet Protocol Security), SSL (Secure Sockets Layer).
Exploring network security mechanisms such as firewalls, intrusion detection systems (IDS. Investigating the
application of network security principles and protocols in various scenarios, including email security.
Network Security Threats and Mitigation Strategies: Understanding various types of network attacks, including
denial-of-service (DoS) attacks, distributed denial-of-service (DDoS) attacks, man-in-the-middle (MitM) attacks,
spoofing attacks, and malware attacks. Implementing network security mitigation strategies, including network
hardening, vulnerability scanning and patching. Exploring network security tools and techniques, such as network
sniffers for network traffic analysis.
REFERENCES:
• William Stallings, "Cryptography and Network Security: Principles and Practice," Pearson. Eigth edition.
2023.
• Sarhan M. Musa, “Network Security and Cryptography,” Mercury Learning and Information, 2nd edition.
2022.
• Andreas Antonopoulos, “Mastering Bitcoin: Unlocking Digital Cryptocurrencies” O’reilly, Second Eduction.
• Jan L. Harrington, "Network Security: A practical Approach," Morgan Kaufmann Publishers.
• Roberta Bragg, Mark Phodes-Ousley, Keith Strassberg, “Network Security The Complete Reference,”
McGraw Hill Publications.
PRACTICAL (2 CREDIT)