IV Year I Semester L T P C
Subject Code: 4 0 0 3
CRYPTOGRAPHY and NETWORK SECURITY
SYLLABUS
Course Outcomes:
The student will be able to
BLOOMS
COURSE
COURSE OUTCOMES TAXONOMY
OUTCOME
LEVEL
CO-1 Classify Security attacks, threats and its measures. Apply
CO-2 Evaluate security mechanisms with Symmetric Key cryptography. Evaluate
Evaluate Number theory and security mechanisms with Asymmetric
CO-3 Evaluate
Key cryptography.
Analyze Data Integrity, Digital Signature Schemes & Key
CO-4 Analyze
Management.
Analyze network security models for ensuring security at
CO-5 Analyze
Application layer and Transport layer.
CO-6 Analyze network security model at Network layer Analyze
The Mapping of CO and PO on 3 point scale{high-3,Medium-2,Low-1}is:
PO- PO- PO- PO- PO- PO- PO- PO- PO- PSO- PSO- PSO-
PO1 PO2 PO3
4 5 6 7 8 9 10 11 12 1 2 3
CO1 3 2 3 1 2 2 0 3 0 0 2 0 3 3 3
CO2 3 2 3 1 2 2 0 3 0 0 2 0 3 3 3
CO3 3 2 3 1 2 2 0 3 0 0 2 0 3 3 3
CO4 3 2 3 3 3 3 0 3 0 0 2 0 3 3 3
CO5 3 2 3 3 3 3 0 3 0 0 2 0 3 3 3
CO6 3 2 3 3 3 3 0 3 0 0 2 0 3 3 3
Course objectives:
The main objective of this course is to teach students to understand and how to address
various software security problems in a secure and controlled environment. During this
course the students will gain knowledge (both theoretical and practical) in various kinds
of software security problems, and techniques that could be used to protect the software
from security threats. The students will also learn to understand the “modus operandi”
of adversaries; which could be used for increasing software dependability.
Course outcomes:
1. be able to individually reason about software security problems and protection
techniques on both an abstract and a more technically advanced level.
2. be able to individually explain how software exploitation techniques, used by
adversaries, function and how to protect against them.
Syllabus:
UNIT I : Classical Encryption Techniques
Objectives: The Objectives of this unit is to present an overview of the main concepts
of cryptography, understand the threats & attacks, understand ethical hacking.
Introduction: Security attacks, services & mechanisms, Symmetric Cipher Model,
Substitution Techniques, Transportation Techniques, Cyber threats and their defense(
Phishing Defensive measures, web based attacks, SQL injection & Defense
techniques)(TEXT BOOK 2), Buffer overflow & format string vulnerabilities, TCP
session hijacking(ARP attacks, route table modification) UDP hijacking ( man-in-the-
middle attacks)(TEXT BOOK 3).
UNIT II: Block Ciphers & Symmetric Key Cryptography
Objectives: The Objectives of this unit is to understand the difference between stream
ciphers & block ciphers, present an overview of the Feistel Cipher and explain the
encryption and decryption, present an overview of DES, Triple DES, Blowfish, IDEA.
Traditional Block Cipher Structure, DES, Block Cipher Design Principles, AES-
Structure, Transformation functions, Key Expansion, Blowfish, CAST-128, IDEA,
Block Cipher Modes of Operations
UNIT III: Number Theory & Asymmetric Key Cryptography
Objectives: Presents the basic principles of public key cryptography, Distinct uses of public
key cryptosystems
Number Theory: Prime and Relatively Prime Numbers, Modular Arithmetic,
Fermat’s and Euler’s Theorems, The Chinese Remainder theorem, Discrete
logarithms.
Public Key Cryptography: Principles, p u b l i c k e y c r y p t o g r a p h y a l g o r i t h
m s , RSA Algorithms, Diffie Hellman Key Exchange, Elgamal encryption &
decryption, Elliptic Curve Cryptography.
UNIT IV : Cryptographic Hash Functions & Digital Signatures
Objectives: Present overview of the basic structure of cryptographic functions,
Message Authentication Codes, Understand the operation of SHA-512, HMAC, Digital
Signature
Application of Cryptographic hash Functions, Requirements & Security, Secure Hash
Algorithm, Message
Authentication Functions, Requirements & Security, HMAC & CMAC. Digital Signatures,
NIST Digital Signature Algorithm. Key management & distribution.
UNIT V: User Authentication, Transport Layer Security & Email Security
Objectives: Present an overview of techniques for remote user authentication,
Kerberos, Summarize Web Security threats and Web traffic security approaches,
overview of SSL & TLS. Present an overview of electronic mail security.
User Authentication: Remote user authentication principles, Kerberos
Transport Level Security: Web Security Requirements, Secure Socket Layer
(SSL)and Transport Layer Security (TLS), Secure Shell(SSH)
Electronic Mail Security: Pretty Good Privacy (PGP) and S/MIME.
UNIT VI: IP Security & Intrusion Detection Systems
Objectives: Provide an overview of IP Security, concept of security association, Intrusion
Detection Techniques
IP Security: IP Security Overview, IP Security Architecture, Authentication
Header, Encapsulating Security Payload, Combining Security Associations and
Key Management.
Intrusion detection: Overview, Approaches for IDS/IPS, Signature based IDS, Host
based IDS/IPS. (TEXT BOOK 2)
TEXT BOOKS:
1. Cryptography & Network Security: Principles and Practices, William Stallings, PEA,
Sixth edition.
2. Introduction to Computer Networks & Cyber Security, Chwan Hwa Wu, J.David
Irwin, CRC press
3. Hack Proofing your Network, Russell, Kaminsky, Forest Puppy, Wiley Dreamtech.
REFERENCE BOOKS:
1. Everyday Cryptography, Fundamental Principles & Applications, Keith Martin, Oxford
2. Network Security & Cryptography, Bernard Menezes, Cengage,2010