This document outlines the syllabus for a course on Cryptography and Network Security. It covers 5 units:
1) Introduction to cryptography theories, algorithms, and building protection mechanisms. Topics include classical encryption techniques and foundations of modern cryptography.
2) Symmetric key cryptography including symmetric ciphers, block cipher principles, AES, and key distribution.
3) Public key cryptography including the mathematics behind asymmetric ciphers and algorithms like RSA, Diffie-Hellman, and Elliptic Curve Cryptography.
4) Message authentication and integrity including hash functions, digital signatures, and authentication protocols.
5) Security practices including email security with PGP and S/MIME, IP security with IPSec, and web security
This document outlines the syllabus for a course on Cryptography and Network Security. It covers 5 units:
1) Introduction to cryptography theories, algorithms, and building protection mechanisms. Topics include classical encryption techniques and foundations of modern cryptography.
2) Symmetric key cryptography including symmetric ciphers, block cipher principles, AES, and key distribution.
3) Public key cryptography including the mathematics behind asymmetric ciphers and algorithms like RSA, Diffie-Hellman, and Elliptic Curve Cryptography.
4) Message authentication and integrity including hash functions, digital signatures, and authentication protocols.
5) Security practices including email security with PGP and S/MIME, IP security with IPSec, and web security
This document outlines the syllabus for a course on Cryptography and Network Security. It covers 5 units:
1) Introduction to cryptography theories, algorithms, and building protection mechanisms. Topics include classical encryption techniques and foundations of modern cryptography.
2) Symmetric key cryptography including symmetric ciphers, block cipher principles, AES, and key distribution.
3) Public key cryptography including the mathematics behind asymmetric ciphers and algorithms like RSA, Diffie-Hellman, and Elliptic Curve Cryptography.
4) Message authentication and integrity including hash functions, digital signatures, and authentication protocols.
5) Security practices including email security with PGP and S/MIME, IP security with IPSec, and web security
CS8792 CRYPTOGRAPHY AND NETWORK CS6701 Syllabus Cryptography and
SECURITY Network Security
OBJECTIVES: To understand Cryptography Theories, Algorithms and Systems. UNIT I INTRODUCTION & NUMBER THEORY 10 To understand necessary Approaches and Techniques Services, Mechanisms and attacks-the OSI security to build protection architecture-Network security model-Classical mechanisms in order to secure computer networks. Encryption techniques (Symmetric cipher model, UNIT I INTRODUCTION substitution techniques, transposition techniques, Security trends – Legal, Ethical and Professional Aspects steganography).FINITE FIELDS AND NUMBER of Security, Need for Security at Multiple levels, Security THEORY: Groups, Rings, Fields-Modular arithmetic- Policies – Model of network security – Security attacks, Euclid‟s algorithm-Finite fields- Polynomial Arithmetic services and mechanisms – OSI security architecture – –Prime numbers-Fermat‟s and Euler‟s theorem-Testing Classical encryption techniques: substitution techniques, for primality -The Chinese remainder theorem- Discrete transposition techniques, steganography- Foundations of logarithms. modern cryptography: perfect security – information UNIT II BLOCK CIPHERS & PUBLIC KEY theory – product cryptosystem – cryptanalysis. CRYPTOGRAPHY 10 CS6701 Syllabus UNIT II SYMMETRIC KEY CRYPTOGRAPHY Cryptography and Network Security MATHEMATICS OF SYMMETRIC KEY Data Encryption Standard-Block cipher principles-block CRYPTOGRAPHY: Algebraic structures – Modular cipher modes of operation-Advanced Encryption arithmetic-Euclid‟s algorithm- Congruence and matrices Standard (AES)-Triple DES-Blowfish-RC5 algorithm. -Groups, Rings, Fields- Finite fields- SYMMETRIC Public key cryptography: Principles of public key KEY CIPHERS: SDES – Block cipher Principles of DES cryptosystems-The RSA algorithm-Key management – – Strength of DES – Differential and linear cryptanalysis Diffie Hellman Key exchange-Elliptic curve arithmetic- – Block cipher design principles – Block cipher mode of Elliptic curve cryptography. operation – Evaluation criteria for AES – Advanced UNIT III HASH FUNCTIONS AND DIGITAL Encryption Standard – RC4 – SIGNATURES 8 CS6701 Syllabus Cryptography and Key distribution. Network Security UNIT III PUBLIC KEY CRYPTOGRAPHY Authentication requirement – Authentication function – MATHEMATICS OF ASYMMETRIC KEY MAC – Hash function – Security of hash function and CRYPTOGRAPHY: Primes – Primality Testing – MAC –MD5 – SHA – HMAC – CMAC – Digital Factorization – Euler‘s totient function, Fermat‘s and signature and authentication protocols – DSS – EI Gamal Euler‘s Theorem – Chinese Remainder Theorem – – Schnorr. Exponentiation and logarithm – ASYMMETRIC KEY UNIT IV SECURITY PRACTICE & SYSTEM CIPHERS: RSA cryptosystem – Key distribution – Key SECURITY 8 CS6701 Syllabus Cryptography and management – Diffie Hellman key exchange -ElGamal Network Security cryptosystem – Elliptic curve arithmetic-Elliptic curve Authentication applications – Kerberos – X.509 cryptography. Authentication services – Internet Firewalls for Trusted UNIT IV MESSAGE AUTHENTICATION AND System: Roles of Firewalls – Firewall related INTEGRITY terminology- Types of Firewalls – Firewall designs – Authentication requirement – Authentication function – SET for E-Commerce Transactions. Intruder – Intrusion MAC – Hash function – Security of hash function and detection system – Virus and related threats – MAC – SHA –Digital signature and authentication Countermeasures – Firewalls design principles – Trusted protocols – DSS- Entity Authentication: Biometrics, systems – Practical implementation of cryptography and Passwords, Challenge Response protocols- security. Authentication applications – Kerberos, X.509 UNIT V E-MAIL, IP & WEB SECURITY 9 CS6701 UNIT V SECURITY PRACTICE AND SYSTEM Syllabus Cryptography and Network Security SECURITY E-mail Security: Security Services for E-mail-attacks Electronic Mail security – PGP, S/MIME – IP security – possible through E-mail – establishing keys privacy- Web Security – SYSTEM SECURITY: Intruders – authentication of the source-Message Integrity-Non- Malicious software – viruses – Firewalls. repudiation-Pretty Good Privacy-S/MIME. IPSecurity: Overview of IPSec – IP and IPv6-Authentication Header- Encapsulation Security Payload (ESP)-Internet Key Exchange (Phases of IKE, ISAKMP/IKE Encoding). Web Security: SSL/TLS Basic Protocol-computing the keys- client authentication-PKI as deployed by SSLAttacks fixed in v3- Exportability-Encoding-Secure Electronic Transaction (SET).
Nomenclatura - Encyclopedia of modern Cryptography and Internet Security: From AutoCrypt and Exponential Encryption to Zero-Knowledge-Proof Keys [Paperback]