0% found this document useful (0 votes)
29 views1 page

Bcse 0004

Uploaded by

Suraj Mishra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views1 page

Bcse 0004

Uploaded by

Suraj Mishra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Course Curriculum (for Session 2019-20)

B.Tech. in Computer Science & Engineering

BCSE0004: CRYPTOGRAPHY & NETWORK SECURITY


Credits:03 L-T-P-J:3-0-0-0

Module Teaching
No. Content Hours
Introduction: Introduction to Security Attacks, Services and Mechanism, Classical
Encryption Techniques-Substitution Ciphers and Transposition Ciphers, Steganography,
Stream and Block Ciphers, Cryptanalysis.
Symmetric Key Cryptosystems: Block Cipher Principles, Shannon’s Theory of Confusion and
I 14
Diffusion, Data Encryption Standard(DES), Strength of DES, Triple DES, Advance Encryption
Standard (AES), Linear and Differential Cryptanalysis, Block Ciphers Modes of Operation.
Introduction to Number Theory: Modular Arithmetic, Prime and Relative Prime Numbers,
Primitive Roots, Fermat’s and Euler’s Theorem, Extended Euclidean Algorithm, Chinese
Remainder Theorem.
Algebraic Structures: Introduction to Group, Ring & Field of the Form GF(P). Asymmetric
Key Cryptosystems: RSA Cryptosystem, Attacks on RSA, Security of RSA, Discrete Logarithm
Problem, Elgamal Encryption Algorithm.
II 13
Hash Functions and Macs: Authentication Functions, Message Authentication Code, Hash
Functions, Birthday Attacks, Security of Hash Functions, Secure Hash Algorithm (SHA-512).
Digital Signature: Digital Signatures, RSA Digital Signature Scheme, Elgamal Digital
Signature Techniques, Digital Signature Standards (DSS).
Key Management: Symmetric Key Distribution, Diffie Hellman Key Exchange Algorithm.
Public Key Distribution: X.509 Certificates, Public Key Infrastructure.
Authentication Applications and E-Mail Security: Kerberos, Pretty Good Privacy (PGP),
S/MIME.
III 18
IP Security and Web Security: IP Sec Architecture, Authentication Header, Encapsulating
Security Payloads, Combining Security Associations, Key Management, Introduction to Secure
Socket Layer, Transport Layer Security, Secure Electronic Transaction (SET).
System Security: Introductory Idea of Intrusion, Intrusion Detection, Malicious Programs,
Firewalls.

Text Books:
 W. Stallings (2010), "Cryptography and Network Security: Principles and Practices",5th Edition,
Pearson Education.
Reference Books:
 B. A. Forouzan (2003), "Cryptography & Network Security", 3rd Edition, Tata McGraw Hill.
 Wenbo Mao (2003), “Modern Cryptography: Theory and Practice”, Prentice Hall.
 Douglas Stinson, "Cryptography Theory and Practice", 2nd Edition, Chapman& Hall/CRC.
Outcome: After completion of course, the student will be able to:
 Understands various encryptions and decryption techniques.
 Learn protocols used in Web Security and Transport layer Security.
 Define the terms vulnerability, threat and attack and classify different attacks.
 Discuss network security designs using available secure solutions.

DEPARTMENT OF COMPUTER ENGINEERING & APPLICATIONS, Institute of Engineering & Technology

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy