0% found this document useful (0 votes)
119 views3 pages

IV Year I Semester L T P C Subject Code: 4 0 0 3 Cryptography and Network Security Syllabus

This document outlines a course on Cryptography and Network Security. It includes 6 units that will cover topics such as classical encryption techniques, block ciphers, asymmetric key cryptography, hash functions, authentication, transport layer security, IP security, and intrusion detection systems. The course aims to teach students how to understand and address various software security problems. By the end of the course students will be able to reason about software security issues and techniques, and explain how exploitation techniques function and can be defended against.

Uploaded by

pragati
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
119 views3 pages

IV Year I Semester L T P C Subject Code: 4 0 0 3 Cryptography and Network Security Syllabus

This document outlines a course on Cryptography and Network Security. It includes 6 units that will cover topics such as classical encryption techniques, block ciphers, asymmetric key cryptography, hash functions, authentication, transport layer security, IP security, and intrusion detection systems. The course aims to teach students how to understand and address various software security problems. By the end of the course students will be able to reason about software security issues and techniques, and explain how exploitation techniques function and can be defended against.

Uploaded by

pragati
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

IV Year I Semester L T P C

Subject Code: 4 0 0 3
CRYPTOGRAPHY and NETWORK SECURITY
SYLLABUS

Course Outcomes:
The student will be able to
BLOOMS
COURSE
COURSE OUTCOMES TAXONOMY
OUTCOME
LEVEL
CO-1 Classify Security attacks, threats and its measures. Apply
CO-2 Evaluate security mechanisms with Symmetric Key cryptography. Evaluate
Evaluate Number theory and security mechanisms with Asymmetric
CO-3 Evaluate
Key cryptography.
Analyze Data Integrity, Digital Signature Schemes & Key
CO-4 Analyze
Management.
Analyze network security models for ensuring security at
CO-5 Analyze
Application layer and Transport layer.
CO-6 Analyze network security model at Network layer Analyze

The Mapping of CO and PO on 3 point scale{high-3,Medium-2,Low-1}is:

PO- PO- PO- PO- PO- PO- PO- PO- PO- PSO- PSO- PSO-
PO1 PO2 PO3
4 5 6 7 8 9 10 11 12 1 2 3
CO1 3 2 3 1 2 2 0 3 0 0 2 0 3 3 3
CO2 3 2 3 1 2 2 0 3 0 0 2 0 3 3 3
CO3 3 2 3 1 2 2 0 3 0 0 2 0 3 3 3
CO4 3 2 3 3 3 3 0 3 0 0 2 0 3 3 3
CO5 3 2 3 3 3 3 0 3 0 0 2 0 3 3 3
CO6 3 2 3 3 3 3 0 3 0 0 2 0 3 3 3

Course objectives:

The main objective of this course is to teach students to understand and how to address
various software security problems in a secure and controlled environment. During this
course the students will gain knowledge (both theoretical and practical) in various kinds
of software security problems, and techniques that could be used to protect the software
from security threats. The students will also learn to understand the “modus operandi”
of adversaries; which could be used for increasing software dependability.

Course outcomes:

1. be able to individually reason about software security problems and protection


techniques on both an abstract and a more technically advanced level.
2. be able to individually explain how software exploitation techniques, used by
adversaries, function and how to protect against them.
Syllabus:
UNIT I : Classical Encryption Techniques
Objectives: The Objectives of this unit is to present an overview of the main concepts
of cryptography, understand the threats & attacks, understand ethical hacking.

Introduction: Security attacks, services & mechanisms, Symmetric Cipher Model,


Substitution Techniques, Transportation Techniques, Cyber threats and their defense(
Phishing Defensive measures, web based attacks, SQL injection & Defense
techniques)(TEXT BOOK 2), Buffer overflow & format string vulnerabilities, TCP
session hijacking(ARP attacks, route table modification) UDP hijacking ( man-in-the-
middle attacks)(TEXT BOOK 3).

UNIT II: Block Ciphers & Symmetric Key Cryptography


Objectives: The Objectives of this unit is to understand the difference between stream
ciphers & block ciphers, present an overview of the Feistel Cipher and explain the
encryption and decryption, present an overview of DES, Triple DES, Blowfish, IDEA.

Traditional Block Cipher Structure, DES, Block Cipher Design Principles, AES-
Structure, Transformation functions, Key Expansion, Blowfish, CAST-128, IDEA,
Block Cipher Modes of Operations

UNIT III: Number Theory & Asymmetric Key Cryptography


Objectives: Presents the basic principles of public key cryptography, Distinct uses of public
key cryptosystems

Number Theory: Prime and Relatively Prime Numbers, Modular Arithmetic,


Fermat’s and Euler’s Theorems, The Chinese Remainder theorem, Discrete
logarithms.
Public Key Cryptography: Principles, p u b l i c k e y c r y p t o g r a p h y a l g o r i t h
m s , RSA Algorithms, Diffie Hellman Key Exchange, Elgamal encryption &
decryption, Elliptic Curve Cryptography.

UNIT IV : Cryptographic Hash Functions & Digital Signatures


Objectives: Present overview of the basic structure of cryptographic functions,
Message Authentication Codes, Understand the operation of SHA-512, HMAC, Digital
Signature

Application of Cryptographic hash Functions, Requirements & Security, Secure Hash


Algorithm, Message
Authentication Functions, Requirements & Security, HMAC & CMAC. Digital Signatures,
NIST Digital Signature Algorithm. Key management & distribution.

UNIT V: User Authentication, Transport Layer Security & Email Security


Objectives: Present an overview of techniques for remote user authentication,
Kerberos, Summarize Web Security threats and Web traffic security approaches,
overview of SSL & TLS. Present an overview of electronic mail security.

User Authentication: Remote user authentication principles, Kerberos


Transport Level Security: Web Security Requirements, Secure Socket Layer
(SSL)and Transport Layer Security (TLS), Secure Shell(SSH)
Electronic Mail Security: Pretty Good Privacy (PGP) and S/MIME.

UNIT VI: IP Security & Intrusion Detection Systems


Objectives: Provide an overview of IP Security, concept of security association, Intrusion
Detection Techniques

IP Security: IP Security Overview, IP Security Architecture, Authentication


Header, Encapsulating Security Payload, Combining Security Associations and
Key Management.
Intrusion detection: Overview, Approaches for IDS/IPS, Signature based IDS, Host
based IDS/IPS. (TEXT BOOK 2)

TEXT BOOKS:
1. Cryptography & Network Security: Principles and Practices, William Stallings, PEA,
Sixth edition.
2. Introduction to Computer Networks & Cyber Security, Chwan Hwa Wu, J.David
Irwin, CRC press
3. Hack Proofing your Network, Russell, Kaminsky, Forest Puppy, Wiley Dreamtech.

REFERENCE BOOKS:
1. Everyday Cryptography, Fundamental Principles & Applications, Keith Martin, Oxford
2. Network Security & Cryptography, Bernard Menezes, Cengage,2010

You might also like