Cryptography and Network Security

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

K. J.

Somaiya College of Engineering, Mumbai -77


(Autonomous College Affiliated to University of Mumbai)

Course Code Course Title


2UST633 Cryptography and Network Security

TH P TUT Total
Teaching
03 _ -- 03
Scheme(Hrs.)
Credits Assigned 02 -- -- 02
Marks
Examination CA
Scheme ESE TW O P P&O Total
ISE IA
30 20 50 -- -- -- -- 50

Course Pre-requisites: Number Theory

Course Objectives
 The objective of this course is to enable the students to understand the need of data
security and security goals. Course covers the mathematics and working of the cryptographic
algorithms. Course gives the insight about authentication services, authentication algorithms
and creates awareness about network threats and security services.

Course Outcomes
At the end of successful completion of the course the student will be able to
CO1. Understand fundamental knowledge about data security and mathematics of
cryptography.
CO2. Discuss symmetric encryption systems and its key management.
CO3. Discuss asymmetric encryption systems and its key management.
CO4. Explain message integrity, authentication and its related security services.
CO5. Describe network intrusions and their counter measures.
K. J. Somaiya College of Engineering, Mumbai -77
(Autonomous College Affiliated to University of Mumbai)

Module Unit Details Hrs. CO


No. No.
1 Data Security & Mathematics of cryptography
1.1 Security goals, cryptography, security attacks, security
services and security mechanism, cryptanalysis.
1.2 Mathematics of cryptography –Primes, factorization,
modular arithmetic, Fermat’s little theorem, Euler’s 8 CO1
theorem, extended Euclidean algorithm, Chinese
Remainder Theorem.
#Self-Learning: Algebriac Structures, Group, Ring, Field,
GF(2n )
2 Symmetric Key Encipherment and Key Management
2.1 Classical Encryption Techniques - Substitution
Technique, Transposition Technique, Steganography
2.2 Stream and Block ciphers, block ciphers modes of
operation.
2.3 Encryption Algorithms- Simplified DES, Data 10 CO2
Encryption Standard, Double and triple DES, Simplified
AES and Advanced Encryption Standard (AES).
2.4 Key management - Symmetric key Distribution,
Kerberos, Symmetric key agreement and security of
Diffie Hellman key exchange security.
3 Asymmetric key Encipherment and Key Management
3.1 Principles of Asymmetric key Encipherment
3.2 RSA Algorithm, attacks on RSA, Rabin cryptosystem, 10 CO3
Elgamal Cryptosystem and Elliptical curve cryptography
3.3 Key Management - Public key distribution
4 Message Integrity and Authentication
4.1 Message integrity, Message authentication Requirements
and Functions, Message authentication codes.
4.2 Cryptographic Hash Functions –Hash Functions,
Description of MD hash family and SHA – 512. 10 CO4
4.3 Digital Signature - RSA Digital Signature, Elgamel
Digital Signature, Digital Signature algorithm.
4.4 Entity Authentication – Password Based Authentication,
Biometrics.
5 System and Network Security
5.1 Malicious Programs - Worms, Virus, Logic bombs,
Trojans, Spyware, Adwares.
5.2 Intrusion Detection System, Virus Countermeasures
7 CO5
5.3 Firewalls – Design Principles and Characteristics, Types
of firewalls, Firewall Configurations.
5.4 Network Security at Application layer - Email System,
Pretty Good Privacy (PGP), S/MIME.
Total 45
K. J. Somaiya College of Engineering, Mumbai -77
(Autonomous College Affiliated to University of Mumbai)

Recommended Books:

Sr. Name/s of Author/s Title of Book Name of Edition and


No. Publisher with Year of
country Publication
1. William Stalling Cryptography and Network Pearson 5th edition,
Security: Principles and Education Asia 2013
Practice
2. Behrouz A. Forouzan, Cryptography and Network Mc Graw Hill 3rd edition,
Debdeep Security Publication 2016
Mukhopadhyay
3. Bernard Menezes Network Security and Cengage 1st edition,
Cryptography Learning 2011
4. Atul Kahate Cryptography and Network Mc Graw Hill 3rd edition,
Security Publication. 2017

# Learners should prepare all self-learning topics on their own. Self-learning topics will
enable students to gain extended knowledge of the topic. Assessment of these topics may
be included in IA.

You might also like