Professional Documents
Culture Documents
CST 415 Security & Cryptography Syllbus
CST 415 Security & Cryptography Syllbus
Semester 7th
Marks-100
Internal-40 External-60
Course Objectives
Understand OSI security architecture and classical encryption techniques and understand various
block cipher and stream cipher models.
Describe the principles of public key cryptosystems, hash functions and digital signature and
knowledge about the security practices which are adopted
Understand the various vulnerable attacks and working with the security services
Unit
Course Outcomes: Upon Completion of the course, the students should be able to:
Describe network security services and mechanisms.
I • Symmetrical and Asymmetrical cryptography.
•
II Data integrity, Authentication, Digital
Signatures.
III • Various network security applications, IPSec, Firewall, IDS, Web security, Email
security, and Malicious software etc.
UNIT –I [15h]
Introduction & Number Theory: Services, Mechanisms and attacks-the OSI security architecture-
Network security model-Classical Encryption techniques (Symmetric cipher model, substitution
techniques, transposition techniques, steganography).FINITE FIELDS AND NUMBER THEORY:
Groups, Rings, Fields-Modular arithmetic-Euclid‟s algorithm-Finite fields- Polynomial Arithmetic –
Prime numbers-Fermat‟s and Euler‟s theorem-Testing for primality -The Chinese remainder
theorem- Discrete logarithms.
Block Ciphers & Public Key Cryptography: Data Encryption Standard-Block cipher principles-
block cipher modes of operation-Advanced Encryption Standard (AES)-Triple DES-Blowfish-RC5
algorithm. Public key cryptography: Principles of public key cryptosystems-The RSA algorithm-
Key management – Diffie Hellman Key exchange-Elliptic curve arithmetic-Elliptic curve
cryptography.
3
UNIT II [15h]
E-mail Security: Security Services for E-mail-attacks possible through E-mail – establishing keys
privacy-authentication of the source-Message Integrity-Non-repudiation-Pretty Good Privacy-
S/MIME.
Web Security: SSL/TLS Basic Protocol-computing the keys- client authentication-PKI as deployed
by SSL Attacks fixed in v3- Exportability-Encoding-Secure Electronic Transaction (SET).
Text Books:
1. William Stallings, Cryptography and Network Security, 6th Edition, Pearson Education, March 2013.
2. Charlie Kaufman, Radia Perlman and Mike Speciner, “Network Security”, Prentice Hall of India, 2002.
Reference Books:
1. Behrouz A. Ferouzan, “Cryptography & Network Security”, Tata McGraw Hill.
2. Man Young Rhee, “Internet Security: Cryptographic Principles”, “Algorithms and Protocols”, Wiley
Publications.
3. Charles Pfleeger, “Security in Computing”, 4th Edition, Prentice Hall of India.
4. Ulysess Black, “Internet Security Protocols”, Pearson Education Asia.
5. Charlie Kaufman and Radia Perlman, Mike Speciner, “Network Security, Second Edition, Private
Communication in Public World”, PHI.
4
Subject Code
Security & Cryptography
CST-415
Department Teaching
Department of CSE (IS)
the Subject
1 2 3 4 5 6 7 8 9 10 11
Program Outcome
Mapping of Course I, I,
outcome with Program II, III II,
outcome III III
Project/
BS ES PD PE OE
Category PC Training
Please go through these instructions thoroughly and follow the same pattern while setting the paper
as the students have been prepared according to this format.
Weight age per unit = 20 marks (excluding over attempt weight age)
3. Set three questions from each unit I, II and III. Students will attempt 5 questions selecting at least
one question from sections B, C & D. Each question carries 10 marks. Questions of Section B will be
from unit I, Questions of Section C from unit II and Questions of section D from unit III.
4. In the question paper, distribution of the questions should be by considering 30 % numerical part
and 70 % conceptual.