Subject Details
Dept     : IT
Sem      : 6
Regul    : R2019
Faculty : Ms.K.Sangeetha
phone  : NIL
E-mail  : sangeetha.k.it@snsct.org
240
Page views
1
Files
0
Videos
0
R.Links

Icon
Syllabus

UNIT
1
INTRODUCTION TO ENCRYPTION STANDARD

Computer Security Concepts - The OSI Security Architecture-Security Attacks - A Model for Network Security - Symmetric Cipher Model - Substitution Techniques - Transposition Techniques – Block Cipher Principles - Data Encryption Standard (DES) - Example - Multiple Encryption and Triple DES - Stream Ciphers - RC4 Lab Practice: 1. Implementation of Classical Encryption Technique 2. Implementation of Substitution Ciphers and Symmetric Cryptosystems 3. Implementation of Data Encryption Standard (DES)

UNIT
2
NUMBER THEORY AND PUBLIC KEY CRYPTOGRAPHY

Principles of Pseudorandom Number Generation - Pseudorandom Number Generators -Divisibility and the Division Algorithm - The Euclidean Algorithm - Modular Arithmetic - The Chinese Remainder Theorem - Principles of Public Key Cryptosystems - The RSA Algorithm - Diffie Hellman Key Exchange - ElGamal Cryptosystem Lab Practice: 1. Implementation of Euclidean Algorithm 2. Implementation of RSA Algorithm 3. Implementation of Diffie - Hellman Key Exchange

UNIT
3
HASH FUNCTION AND DIGITAL SIGNATURE

Cryptographic Hash Functions - Two Simple Hash Functions Requirements and Security - Hash Functions Based on Cipher Block Chaining - Secure Hash Algorithm (SHA) - Message Authentication Codes - Message Authentication Requirements - Message Authentication Codes - Security of MACs - MACs Based on Hash Functions (HMAC) - Digital Signatures - ElGamal Digital Signature Scheme - Schnorr Digital Signature Scheme - Digital Signature Standard (DSS) Lab Practice: 1. Implementation of SHA and MAC 2. Implementation of Digital Signature

UNIT
4
INTERACTIVE TECHNIQUES AND TOOLS

Key Management And Distribution - Symmetric Key Distribution Using Asymmetric Encryption - Distribution of Public Keys - X.509 Certificates - Public Key Infrastructure - User Authentication Protocols - Remote User Authentication Principles - Remote User Authentication Using Symmetric Encryption - Email Security Pretty Good Privacy (PGP) - S/MIME Lab Practice: 1. Implementation of Steganography 2. Implementation of PGP and Public key Distribution

UNIT
5
TRANSPORT LEVEL SECURITY AND SYSTEM SECURITY

Web Security Issues - Secure Sockets Layer (SSL) - Transport Layer Security (TLS) – HTTPS - Secure Shell (SSH) - IP Security Overview - Policy - Encapsulating Security Payload – Intruders - Intrusion Detection - Malicious Software – Viruses – Worms – Kerberos - Firewalls - The Need for Firewall - Types of Firewall - Firewall Configurations Lab Practice: 1. Implementation of SSL 2. Implementation of SSH and TLS

Reference Book:

Behrouz A. Ferouzan, “Cryptography & Network Security”, 2nd Edition, Tata Mc Graw Hill, 2011 Man Young Rhee, “Internet Security: Cryptographic Principles”, “Algorithms and Protocols”, 2nd Edition, Wiley Publications, 2003 Charles Pfleeger, “Security in Computing”, 4th Edition, Prentice Hall of India, 2006 Ulysess Black, “Internet Security Protocols”, 2nd Edition, Pearson Education Asia, 2000

Text Book:

William Stallings, “Cryptography and Network Security”, 6th Edition, Pearson Education, 2013 Charlie Kaufman, Radia Perlman and Mike Speciner, “Network Security”, 2nd Edition, Prentice Hall of India, 2002

 

Print    Download