Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

CS8792 CRYPTOGRAPHY AND NETWORK CS6701 Syllabus Cryptography and

SECURITY  Network Security


OBJECTIVES:
 To understand Cryptography Theories, Algorithms and
Systems. UNIT I INTRODUCTION & NUMBER THEORY
10 
 To understand necessary Approaches and Techniques
Services, Mechanisms and attacks-the OSI security
to build protection
architecture-Network security model-Classical
mechanisms in order to secure computer networks.
Encryption techniques (Symmetric cipher model,
UNIT I INTRODUCTION 
substitution techniques, transposition techniques,
Security trends – Legal, Ethical and Professional Aspects
steganography).FINITE FIELDS AND NUMBER
of Security, Need for Security at Multiple levels, Security
THEORY: Groups, Rings, Fields-Modular arithmetic-
Policies – Model of network security – Security attacks,
Euclid‟s algorithm-Finite fields- Polynomial Arithmetic
services and mechanisms – OSI security architecture –
–Prime numbers-Fermat‟s and Euler‟s theorem-Testing
Classical encryption techniques: substitution techniques,
for primality -The Chinese remainder theorem- Discrete
transposition techniques, steganography- Foundations of
logarithms.
modern cryptography: perfect security – information
UNIT II BLOCK CIPHERS & PUBLIC KEY
theory – product cryptosystem – cryptanalysis.
CRYPTOGRAPHY 10 CS6701 Syllabus
UNIT II SYMMETRIC KEY CRYPTOGRAPHY
Cryptography and Network Security
MATHEMATICS OF SYMMETRIC KEY
Data Encryption Standard-Block cipher principles-block
CRYPTOGRAPHY: Algebraic structures – Modular
cipher modes of operation-Advanced Encryption
arithmetic-Euclid‟s algorithm- Congruence and matrices
Standard (AES)-Triple DES-Blowfish-RC5 algorithm.
-Groups, Rings, Fields- Finite fields- SYMMETRIC
Public key cryptography: Principles of public key
KEY CIPHERS: SDES – Block cipher Principles of DES
cryptosystems-The RSA algorithm-Key management –
– Strength of DES – Differential and linear cryptanalysis
Diffie Hellman Key exchange-Elliptic curve arithmetic-
– Block cipher design principles – Block cipher mode of
Elliptic curve cryptography.
operation – Evaluation criteria for AES – Advanced
UNIT III HASH FUNCTIONS AND DIGITAL
Encryption Standard – RC4 –
SIGNATURES 8 CS6701 Syllabus Cryptography and
Key distribution.
Network Security
UNIT III PUBLIC KEY CRYPTOGRAPHY
Authentication requirement – Authentication function –
MATHEMATICS OF ASYMMETRIC KEY
MAC – Hash function – Security of hash function and
CRYPTOGRAPHY: Primes – Primality Testing –
MAC –MD5 – SHA – HMAC – CMAC – Digital
Factorization – Euler‘s totient function, Fermat‘s and
signature and authentication protocols – DSS – EI Gamal
Euler‘s Theorem – Chinese Remainder Theorem –
– Schnorr.
Exponentiation and logarithm – ASYMMETRIC KEY
UNIT IV SECURITY PRACTICE & SYSTEM
CIPHERS: RSA cryptosystem – Key distribution – Key
SECURITY 8 CS6701 Syllabus Cryptography and
management – Diffie Hellman key exchange -ElGamal
Network Security
cryptosystem – Elliptic curve arithmetic-Elliptic curve
Authentication applications – Kerberos – X.509
cryptography.
Authentication services – Internet Firewalls for Trusted
UNIT IV MESSAGE AUTHENTICATION AND
System: Roles of Firewalls – Firewall related
INTEGRITY
terminology- Types of Firewalls – Firewall designs –
Authentication requirement – Authentication function –
SET for E-Commerce Transactions. Intruder – Intrusion
MAC – Hash function – Security of hash function and
detection system – Virus and related threats –
MAC – SHA –Digital signature and authentication
Countermeasures – Firewalls design principles – Trusted
protocols – DSS- Entity Authentication: Biometrics,
systems – Practical implementation of cryptography and
Passwords, Challenge Response protocols-
security.
Authentication applications – Kerberos, X.509
UNIT V E-MAIL, IP & WEB SECURITY 9 CS6701
UNIT V SECURITY PRACTICE AND SYSTEM
Syllabus Cryptography and Network Security
SECURITY
E-mail Security: Security Services for E-mail-attacks
Electronic Mail security – PGP, S/MIME – IP security –
possible through E-mail – establishing keys privacy-
Web Security – SYSTEM SECURITY: Intruders –
authentication of the source-Message Integrity-Non-
Malicious software – viruses – Firewalls.
repudiation-Pretty Good Privacy-S/MIME. IPSecurity:
Overview of IPSec – IP and IPv6-Authentication Header-
Encapsulation Security Payload (ESP)-Internet Key
Exchange (Phases of IKE, ISAKMP/IKE Encoding).
Web Security: SSL/TLS Basic Protocol-computing the
keys- client authentication-PKI as deployed by
SSLAttacks fixed in v3- Exportability-Encoding-Secure
Electronic Transaction (SET).

You might also like