Bcse 0004
Bcse 0004
Module Teaching
No. Content Hours
Introduction: Introduction to Security Attacks, Services and Mechanism, Classical
Encryption Techniques-Substitution Ciphers and Transposition Ciphers, Steganography,
Stream and Block Ciphers, Cryptanalysis.
Symmetric Key Cryptosystems: Block Cipher Principles, Shannon’s Theory of Confusion and
I 14
Diffusion, Data Encryption Standard(DES), Strength of DES, Triple DES, Advance Encryption
Standard (AES), Linear and Differential Cryptanalysis, Block Ciphers Modes of Operation.
Introduction to Number Theory: Modular Arithmetic, Prime and Relative Prime Numbers,
Primitive Roots, Fermat’s and Euler’s Theorem, Extended Euclidean Algorithm, Chinese
Remainder Theorem.
Algebraic Structures: Introduction to Group, Ring & Field of the Form GF(P). Asymmetric
Key Cryptosystems: RSA Cryptosystem, Attacks on RSA, Security of RSA, Discrete Logarithm
Problem, Elgamal Encryption Algorithm.
II 13
Hash Functions and Macs: Authentication Functions, Message Authentication Code, Hash
Functions, Birthday Attacks, Security of Hash Functions, Secure Hash Algorithm (SHA-512).
Digital Signature: Digital Signatures, RSA Digital Signature Scheme, Elgamal Digital
Signature Techniques, Digital Signature Standards (DSS).
Key Management: Symmetric Key Distribution, Diffie Hellman Key Exchange Algorithm.
Public Key Distribution: X.509 Certificates, Public Key Infrastructure.
Authentication Applications and E-Mail Security: Kerberos, Pretty Good Privacy (PGP),
S/MIME.
III 18
IP Security and Web Security: IP Sec Architecture, Authentication Header, Encapsulating
Security Payloads, Combining Security Associations, Key Management, Introduction to Secure
Socket Layer, Transport Layer Security, Secure Electronic Transaction (SET).
System Security: Introductory Idea of Intrusion, Intrusion Detection, Malicious Programs,
Firewalls.
Text Books:
W. Stallings (2010), "Cryptography and Network Security: Principles and Practices",5th Edition,
Pearson Education.
Reference Books:
B. A. Forouzan (2003), "Cryptography & Network Security", 3rd Edition, Tata McGraw Hill.
Wenbo Mao (2003), “Modern Cryptography: Theory and Practice”, Prentice Hall.
Douglas Stinson, "Cryptography Theory and Practice", 2nd Edition, Chapman& Hall/CRC.
Outcome: After completion of course, the student will be able to:
Understands various encryptions and decryption techniques.
Learn protocols used in Web Security and Transport layer Security.
Define the terms vulnerability, threat and attack and classify different attacks.
Discuss network security designs using available secure solutions.