Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

IT-401 INFORMATION SECURITY

L T P
3 1 0

Credits
4

Total Hours: 40

UNIT I:
Introduction: Security attacks, Services and mechanism, Need for Security, Principles of
Security, OSI security Architecture, Network Security Model. Introduction to Cryptography,
Plain Text and Cipher text, Concept of key.
Cryptographic Protocols: Basic Protocols, Intermediate Protocols, Advanced Protocols,
Esoteric Protocols.
UNIT II:
Cryptographic Techniques: Conventional Encryption Model, Classical Encryption techniquesSubstitution ciphers and Transposition ciphers(Caesar, Hill, playfair , Autokey), Stream and
Block ciphers, Rotor Machines, Steganography, Cryptanalysis.
UNIT III:
Modern Block Ciphers: Block Ciphers Principles, Shannons theory of confusion and diffusion,
feistel structure, Data Encryption Standard(DES),strength of DES, differential and linear
cryptanalysis of DES, Block Cipher Modes of Operations, Triple DES, S-AES, IDEA encryption
and decryption, Strength of IDEA, Pseudo-Random Sequence Generators.
UNIT IV:
Public Key Cryptosystem: Principals of public key cryptosystems, RSA algorithm, security of
RSA, Key Management, Diffie-Hellman key exchange algorithm, Knapsack Algorithm, Rabin
cryptosystem, Elgamal encryption, Introductory idea of Elliptic curve cryptography.
UNIT V:
Message Authentication and Hash Function: Authentication requirements, authentication
functions, Message Authentication Code, Hash functions, Birthday Attacks, Security of Hash
Functions and MACs, MD5, Secure Hash Algorithm (SHA), HMAC,CMAC.
Digital Signatures: Digital Signatures, Authentication Protocols, Digital Signature Standards
(DSS), Elgamal signatures, RSA signatures.
UNIT VI:
Authentication Applications: Kerberos and X.509 Authentication Services, Electronic- Mail
security-pretty good privacy (PGP), S/MIME, CA.
TEXT BOOKS
1. Bruce Schneier, Applied Cryptography: Protocols, algorithms and source code in C,
John Wiley & Sons Inc.
2. William Stallings, Cryptography and Network Security, Prentice Hall
3. Behrouz A. Forouzan , Cryptography & Network Security, McGraw-Hill
REFERENCE BOOKS
1. Pieprzyk, Hardjono, Seberry, Fundamentals of Computer Security, Springer
International Edition.
2. Atul Kahate, Cryptography & Network Security, McGraw-Hill.
3. Mark Stamp, Information Security: Principle and Practice, Wiley.
4. Timothy P. Layton, Information Security, Auerbach Publications.

You might also like