0% found this document useful (0 votes)
158 views

CS421 (1) Cryptography

This document outlines the course plan for CS421 Cryptography and Network Security. The course is divided into 4 units that will be taught over 2 semesters. Unit I introduces classical encryption techniques like symmetric ciphers, block ciphers, and data encryption standards. Unit II covers public key cryptography, key management, and hash functions. Unit III discusses digital signatures, authentication protocols, and IP security. Unit IV examines web security, intruders, firewalls, and malicious software. The course aims to provide 3 theory periods per week along with internal and external evaluations.
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
158 views

CS421 (1) Cryptography

This document outlines the course plan for CS421 Cryptography and Network Security. The course is divided into 4 units that will be taught over 2 semesters. Unit I introduces classical encryption techniques like symmetric ciphers, block ciphers, and data encryption standards. Unit II covers public key cryptography, key management, and hash functions. Unit III discusses digital signatures, authentication protocols, and IP security. Unit IV examines web security, intruders, firewalls, and malicious software. The course aims to provide 3 theory periods per week along with internal and external evaluations.
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 1

CS421(1) CRYPTOGRAPHY AND NETWORK SECURITY

Course: IV/IV B.Tech. II Semester Branch: Computer Science & Engineering External Examination: 3 Hours Internal Examination: 2 Hours Theory: 3 Periods/week External Evaluation: 100 Internal Evaluation: 50

UNIT-I (9) Introduction: Attacks, Service and Mechanisms, Security Attacks, Security Services, The OSI Security Architecture, A model for Network Security. Classical Encryption Techniques: Symmetric Cipher Model, Substitution Techniques, Transposition Techniques, Rotor Machines, Steganography. Block Ciphers and the Data Encryption Techniques: Simplified DES, Block Cipher principles, Data Encryption Standard , Strength of DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles and modes of operation. Advanced Encryption Techniques: Evaluation Criteria for AES, The AES Cipher. Contemporary Symmetric Ciphers: Triple DES, Blowfish ,RC5 Characteristics of Advanced Symmetric Block Ciphers, RC4 Stream Cipher, CAST-128, IDEA Algorithms. UNIT-II (9) Confidentiality Using Conventional Encryption : Placement of Encryption Function, Traffic Confidentiality, Key Distribution, Random Number Generation. Public-Key Cryptography And RSA : Principles of Public-Key Cryptosystems, The RSA Algorithm. Key Management; Other Public-Key Cryptosystems: Key Management, Diffie-Hellman Key Exchange, Elliptic Curve Arithmetic and Cryptography. Message authentication and Hash functions: Authentication Requirements and Functions, Message Authentication Codes, Hash functions, Security of Hash functions and MACs. UNIT III (9) Hash Algorithms: MD5 Message Digest Algorithm, Secure Hash Algorithm, RIPEMED-160, HMAC. Digital Signature and Authentication Protocols : Digital Signatures, Authentication Protocols, Digital Signature Standard. Authentication Applications: Kerberos, X.509 Authentication Service . Electronic Mail Security: Pretty Good Privacy, S/MIME. IP Security: Overview, Architecture, Authentication Header, Encapsulating Security Payload, Combining Security Associations, Key Management. UNIT IV (9) Web Security: Web Security Considerations, Secure Sockets Layer and Transport Layer Security, Secure Electronic Transaction. Intruders: Intruders, Intrusion Detection, Password Management. Malicious Software: Viruses and Related Threats, Virus Counter Measures. Firewalls: Firewall Design Principles, Trusted Systems. SUGGESTED TEXT / REFERENCE BOOKS: 1. William Stallings, Cryptography and Network Security: Principles and Practice , 3rdEdition, Pearson Education, ISBN No:81-7808-605-0. 2. Applied Cryptography by Bruce Schneier, John Wiley & Sons Second Edition, 2002. 3. Denning. D, Cryptography and Data Security, Addison Wesley, 1982.

You might also like