CNS Syllabus

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

IV- Year I- Semester Name of the Course L T P C

Cryptography and Network Security


4101 3 0 0 3
(Common to CSE and IT Branches)
Prerequisites : Mathematical Foundation of Computer Science, Computer Networks

Course Objectives:
1. To understand and classify various security attacks, services mechanisms and
classical cryptographic techniques
1. To analyse the design principles of block ciphers and their implementation.
1. To compute and analyse asymmetric key cryptographic algorithms
1. To evaluate Authentication, Hash Codes and verify the digital signatures
1. To impart the knowledge on Network security concepts.
UNIT-I: Introduction to Cryptography and Network Security 10 Hrs
Introduction: Security attacks, services & mechanisms, Network Security Model, Symmetric
Cipher Model, Mathematics of Cryptography, Substitution Ciphers, Transposition Ciphers
Techniques, Steganography.

UNIT-II: Symmetric Key Cryptography 10 Hrs


Mathematics of Symmetric Key Cryptography, Modern Block Ciphers, Modes of Block Ciphers,
Design Principles of Block Ciphers, Feistel Cipher, Data Encryption Standard, Double DES,
Triple DES, International Data Encryption Algorithm, CAST-128, Blowfish, Advanced
Encryption Standard

UNIT III: Asymmetric (Public) Key Cryptography 10 Hrs


Mathematics of Asymmetric Key Cryptograp

Principles of Public Key Cryptosystems, Applications, RSA, Key Management, Diffie-Hellman


Key Exchange, Elliptic Curve Cryptography, El-Gammal Key Exchange.
UNIT-IV: Data Integrity, Digital Signatures, Authentication Protocols 10 Hrs
Requirements of Hash Functions and Message Authentication Codes, Hash Algorithms: MD5,
SHA-160,256,512, RIPEMD, Properties of Digital Signatures, DSS, Authentication Applications:
Kerberos Version4 and Version 5.

UNIT V: Network Security 10 Hrs


IP Security: IP Security Overview, Architecture, Authentication Header, Encapsulating Security
Payload,
Web Security: Overview, Secure Socket Layer and Transport Layer Security, Secure Electronic
Transaction,
Email Security: Pretty Good Privacy, S/MIME,
System Security: Intruders, Password Management, Viruses and Worms.

Text Books:
1. Cryptography and Network Security Principles and Practices: William Stallings, Pearson
Education, 5th Edition
2. Cryptography and Network Security, Behrouz A Forouzan, Tata McGraw Hill, 3 rd Edition
Reference Book:
1. Practical Cryptography, Bruce Schneier, Wiley, Deamtech India Pvt Ltd.
Web Resources:
1. https://crypto.stanford.edu/~dabo/courses/OnlineCrypto/
1. https://nptel.ac.in/courses/106105162
Course Outcomes:
By the end the of the course, the student will be able to
CO1: Classify various security attacks, services mechanisms and classical cryptographic
techniques
CO2: Analyse the design principles of block ciphers and their implementation.
CO3: Computes and Analyse various Asymmetric Key Cryptographic techniques
CO4: Evaluate Authentication, Hash Codes and verify the digital signatures
CO5: Impart the knowledge on Network security concepts.
CO-PO-PSO Mapping Matrix:

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PPO2

CO-1 3 2 2 2 2 2 2 2
CO-2 3 2 2 2 2 2 2 2
CO-3 3 2 2 2 2 2 2 2
CO-4 - 2 2 2 2 2 2 2
CO-5 - 2 2 2 2 2 2 2

MICRO SYLLABUS
UNIT-I: Introduction to Security
Introduction: Security attacks, services & mechanisms, Network Security Model, Symmetric
Cipher Model, Substitution Ciphers, Transposition Ciphers Techniques, Mathematics of
Cryptography, Introduction to Mathematics of Symmetric Key Cryptography

Unit Module Micro content No of hrs


What is security?
Introduction Security Mechanisms and 2
Services
Types of Attacks, Network
Security Attacks 2
Security Model
Integer Arithmetic, Modular
Arithmetic Operations, Finding
Mathematics of
GCD using Euclidian Algorithm, 3
Cryptography
Extended Euclidian Algorithm,
Linear Diophantine Equations
Introduction to
security Caeser, Brute force
Cryptanalysis, Additive, Product,
Substitution
Affine, Playfair, Hill, 2
Ciphers
Polyalphabetic ciphers: Vigenère,
Vernam, OneTimePad

Railfence, Columnar
Transposition
Transposition, Row
Ciphers 1
Transposition, Rotor Machines
Steganography Types of Steganography
UNIT-II: Symmetric Key Cryptography
Mathematics of Symmetric Key Cryptography, Modern Block Ciphers, Modes of Block Ciphers,
Design Principles of Block Ciphers, Feistel Cipher, Data Encryption Standard, Double DES,
Triple DES, International Data Encryption Algorithm, CAST-128, Blowfish, Advanced
Encryption Standard

Unit Module Micro content No of hrs


Algebraic structures: Groups,
Permutation Groups, Finite
Mathematics of group, Order of a group,
Symmetric Key Subgroup, Cyclic Subgroup,
4
Cryptography Legranges Theorem, Order of an
Symmetric Key Element, Rings, Fields, Finite
Cryptography Fields, Galois Fields, Arithmetic
operations on GF(2n)
Design Principles, Modes of
Block Ciphers 2
Block Ciphers
Modern Feistel Cipher, DES, Double
Cryptographic DES, Triple DES, IDEA, CAST 4
Algorithms, 128, Blowfish, AES
UNIT-III: Asymmetric Key Cryptography

Primitive Roots, Discrete Logarithms,


Principles of Public Key Cryptosystems, Applications, RSA, Key Management, Diffie-Hellman
Key Exchange, Elliptic Curve Cryptography, El-Gammal Key Exchange.
Unit Module Micro content No of hrs
Number Theory, Prime
Mathematics of
Asymmetric Key Chines Remainder Theorems, 5
Cryptography Primitive Roots, Discrete
Logarithms
Asymmetric Key
Introduction, RSA, Diffie-
Cryptography
Hellman, Elliptic Curve
Public key Cryptography, El-Gammal
5
Cryptography Encryption , Security
Analysis of Public Key
cryptographic Algorithms
UNIT-IV: Data Integrity, Digital Signatures and Authentication Protocols
Requirements of Hash Functions and Message Authentication Codes, Hash Algorithms: MD5,
SHA-160,256,512, RIPEMD, Properties of Digital Signatures, DSS, Authentication Applications:
Kerberos Version4 and Version 5.
Unit Module Micro content No of hrs
Requirements of Message
Authentication Codes,
Requirements of Hash
Data Integrity, Data Integrity 5
Functions, Hash
Digital Signatures,
Algorithms: MD5, SHA
Authentication
160,256,512, RIPEMD
Protocols
Introduction, Properties,
Digital Signatures Types, Digital Signature 2
Algorithm
Authentication Introduction, Kerberos
3
Protocols Version 4 and 5
UNIT-V: Network Security
IP Security: IP Security Overview, Architecture, Authentication Header, Encapsulating Security
Payload,
Web Security: Overview, Secure Socket Layer and Transport Layer Security, Secure Electronic
Transaction,
Email Security: Pretty Good Privacy, S/MIME,
System Security: Intruders, Password Management, Viruses and Worms.
Unit Module Micro content No of hrs
Overview, Architecture,
Authentication Header,
IP Security 3
Encapsulating Security
Payload Header
Overview, Secure Socket
Layer, Transport Layer
Web Security 3
Network Security Security, Secure
Electronic Transaction
Introduction, PGP,
Email Security 2
S/MIME
Intruders, Password
System Security Management, Viruses and 2
Worms

****

You might also like