CNS Syllabus
CNS Syllabus
CNS Syllabus
Course Objectives:
1. To understand and classify various security attacks, services mechanisms and
classical cryptographic techniques
1. To analyse the design principles of block ciphers and their implementation.
1. To compute and analyse asymmetric key cryptographic algorithms
1. To evaluate Authentication, Hash Codes and verify the digital signatures
1. To impart the knowledge on Network security concepts.
UNIT-I: Introduction to Cryptography and Network Security 10 Hrs
Introduction: Security attacks, services & mechanisms, Network Security Model, Symmetric
Cipher Model, Mathematics of Cryptography, Substitution Ciphers, Transposition Ciphers
Techniques, Steganography.
Text Books:
1. Cryptography and Network Security Principles and Practices: William Stallings, Pearson
Education, 5th Edition
2. Cryptography and Network Security, Behrouz A Forouzan, Tata McGraw Hill, 3 rd Edition
Reference Book:
1. Practical Cryptography, Bruce Schneier, Wiley, Deamtech India Pvt Ltd.
Web Resources:
1. https://crypto.stanford.edu/~dabo/courses/OnlineCrypto/
1. https://nptel.ac.in/courses/106105162
Course Outcomes:
By the end the of the course, the student will be able to
CO1: Classify various security attacks, services mechanisms and classical cryptographic
techniques
CO2: Analyse the design principles of block ciphers and their implementation.
CO3: Computes and Analyse various Asymmetric Key Cryptographic techniques
CO4: Evaluate Authentication, Hash Codes and verify the digital signatures
CO5: Impart the knowledge on Network security concepts.
CO-PO-PSO Mapping Matrix:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PPO2
CO-1 3 2 2 2 2 2 2 2
CO-2 3 2 2 2 2 2 2 2
CO-3 3 2 2 2 2 2 2 2
CO-4 - 2 2 2 2 2 2 2
CO-5 - 2 2 2 2 2 2 2
MICRO SYLLABUS
UNIT-I: Introduction to Security
Introduction: Security attacks, services & mechanisms, Network Security Model, Symmetric
Cipher Model, Substitution Ciphers, Transposition Ciphers Techniques, Mathematics of
Cryptography, Introduction to Mathematics of Symmetric Key Cryptography
Railfence, Columnar
Transposition
Transposition, Row
Ciphers 1
Transposition, Rotor Machines
Steganography Types of Steganography
UNIT-II: Symmetric Key Cryptography
Mathematics of Symmetric Key Cryptography, Modern Block Ciphers, Modes of Block Ciphers,
Design Principles of Block Ciphers, Feistel Cipher, Data Encryption Standard, Double DES,
Triple DES, International Data Encryption Algorithm, CAST-128, Blowfish, Advanced
Encryption Standard
****