Professional Documents
Culture Documents
Communication & Network Security: (CNS) Code: EC6112
Communication & Network Security: (CNS) Code: EC6112
(CNS)
Code: EC6112
Semeste: 6th
Branch:E&CSc
Course Outcomes
Course Outcome: At the end of the course, the students will be able to :
CO1. Analyze different security threats and attacks with reference to ISO/OSI
model security.
CO2. Differentiate between various cryptography, watermarking, steganography
methods.
CO3. Analyze different Symmetric and Asymmetric cryptographic algorithms.
CO4. Differentiate various key distribution and Digital Signature.
CO5. Analyze the working of various communication security protocols with
respect to OSI layer.
CO6. Analyze different network security systems implementation in Wireless
systems.
Syllabus
• Prerequisite: Data Communication and Networking (EC 3028)
• We use the concept of layers in our daily life. As an example, let us consider
two friends who communicate through postal mail. The process of sending a
letter to a friend would be complex if there were no services available from
the post office.
Tasks involved in sending a letter
THE OSI MODEL
• Established in 1947, the International
Standards Organization (ISO) is a
multinational body dedicated to
worldwide agreement on • ISO is an organization.
international standards. An ISO
• (ISO:Internation Standard Organization)
standard that covers all aspects of
network communications is the Open
Systems Interconnection (OSI) model.
It was first introduced in the late • OSI is a model.
1970s. (Open Systey )
THE OSI MODEL
The interaction between layers in the OSI model
An exchange of data using the OSI model
Encapulation Decapulation
Physical Charecteresyics of OSI Model
Layers
Physical Charecteresyics of Physical Layer
Responsibilities:
• Modulation
• Line codind
• Syncronization of bits
• Interface
• Topology
• Transmission
The physical layer is responsible for movements of
individual bits from one hop (node) to the next.
Physical Charecteresyics of Data Link Layer
Responsibilities:
• Framing
• Physical Addressing
(07:01:02:01:2C:4B (6-bytes))
• Flow Control
• Error Control
• Access Control
Responsibilities:
• Routing
Responsibilities:
• Source addressing (Socket
addressing= IP address + Port
no)
• Flow Control
• Error Control
• Dialogue control
• Synchronisation
Responsibilities:
• Translation
• Encryption
• Compression
• Responsibilities:
Providing services to the end usr
HTTP (Hypertext Transfer Protocol )
FTP (File Trasfer Protocol)
SMTP (Simple mail Transfer Protocol)
Type of Tccniques:
• CRYPTOGRAPHY
• Symmetric-Key Encipherment
• Asymmetric-Key Encipherment
• Hashing
• STEGANOGRAPHY
Cryptography
Cryptography
Cryptography means concealing the contents of message by enciphering
Steganography means concealing the message itself by covering it with something else
Symmetric-Key Encipherment
What is Encryption/ Decryption
Symmentric Cryptography
Symmetric-key Encipherment
Alice
Bob
Asymmetric Key Cryptography
Asymmetric Key Encipherment
Asymmetric-key Encipherment
Cryptography (Encryption/Decryption)
Cryptography
Symmetric-key Encipherment
Alice
Bob
Symmentric Cryptography
Asymmetric-Key Encipherment
Cryptography (Encryption/Decryption)
What is Cryptography
What is Encryption/ Decryption