CS409 Cryptography and Network Security
CS409 Cryptography and Network Security
CS409 Cryptography and Network Security
COM
Course Year of
Course Name L-T-P Credits
code Introduction
CRYPTOGRAPHY AND NETWORK
CS409 3-0-0-3 2016
SECURITY
Course Objectives:
To introduce fundamental concepts of symmetric and asymmetric cipher models.
To introduce fundamental concepts of authentication.
To introduce network security and web security protocols.
Syllabus:
Symmetric Cipher Models - Differential and linear Cryptanalysis- Block Cipher Design
principles- Primitive operations- Key expansions- Inverse Cipher- Principles of Public key
Cryptography Systems - Authentication functions- Message authentication codes- Hash
functions- Digital signatures- Authentication protocols- Network security - Web Security -
secure Socket Layer and Transport layer Security- Secure electronic transaction –Firewalls.
Expected Outcome:
The Students will be able to :
i. summarize different classical encryption techniques
ii. identify mathematical concepts for different cryptographic algorithms
iii. demonstrate cryptographic algorithms for encryption/key exchange
iv. summarize different authentication and digital signature schemes
v. identify security issues in network, transport and application layers and outline
appropriate security protocols
Text Books:
1. Behrouz A. Forouzan, Cryptography and Network Security, Tata McGraw-Hill. 2010
2. William Stallings, Cryptography and Network Security, Pearson Education, 2014
References:
1. B. Schneier , Applied Cryptography, Protocols, Algorithms, and Source Code in C, 2 nd
Edn, Wiley, 1995.
2. Charlie Kaufman, Radia Perlman, Mike Speciner, Network Security, PHI, 2002
Course Plan
End
Sem.
Module Contents Hours
Exam
Marks
Symmetric Cipher Models- Substitution techniques- Transposition
techniques- Rotor machines-Steganography. Simplified DES- Block
I Cipher principles- The Data Encryption Standard, Strength of DES- 7 15 %
Differential and linear Cryptanalysis. Block Cipher Design
principles- Block Cipher modes of operations.
IDEA: Primitive operations- Key expansions- One round, Odd
round, Even Round- Inverse keys for decryption. AES: Basic
II 7 15 %
Structure- Primitive operation- Inverse Cipher- Key Expansion,
Rounds, Inverse Rounds. Stream Cipher –RC4.
FIRST INTERNAL EXAM