#1
| |||
| |||
Sathyabama Institute of Science and Technology B.E. - Electronics and Telecommunication Engineering SECA3001 Cryptography and Network Security Syllabus SATHYABAMA INSTITUTE OF SCIENCE AND TECHNOLOGY SCHOOL OF ELECTRICAL AND ELECTRONICS ENGINEERING SECA3001 CRYPTOGRAPHY AND NETWORK SECURITY L T P Credits Total Marks 3 0 0 3 100 UNIT 1 FUNDAMENTALS 9 Hrs. The OSI security architecture-Network security model-Principles of Security - Confidentiality, Authentication, Integrity, Nonrepudiation, Access Control, Availability: Types of Attacks - Active and Passive: Classical Encryption Techniques: Substitution Cipher - Caesar Cipher, Play Fair Cipher, Hill cipher, One Time Pad: Transposition Cipher - Rail Fence and Simple Columnar Techniques. UNIT 2 SYMMETRIC KEY CRYPTOGRAPHY 9 Hrs. Symmetric Key Cryptosystems: Comparison of Stream Ciphers and Block Ciphers: Feistel Block Cipher: Block Cipher Modes of Operation: Data Encryption Standard - Details of one round in DES: Advanced Encryption Standard. UNIT 3 PUBLIC KEY CRYPTOGRAPHY 9 Hrs. Modular Arithmetic: Euclidean Algorithm: Fermat’s and Euler’s Theorem; Chinese Remainder Theorem: Principles of Public Key Cryptosystems; Key Management - Distribution of Public Keys, Use of Public Key Encryption to Distribute Secret Keys: RSA Algorithm, Diffie-Hellman Key Exchange; Concepts of Elliptic Curve Cryptography. UNIT 4 SECURITY FUNCTIONS AND APPLICATIONS 9 Hrs. Authentication Requirements: Message Authentication Codes - Requirements for MAC, Basic Uses of MAC: Hash Functions HMAC - Requirements for a Hash function, MD-5 SHA 1 Kerberos: X.509 Authentication Service – Certificate: E-Mail Security - Pretty good Privacy, S/MIME. UNIT 5 NETWORK AND SYSTEM SECURITY 9 Hrs. IP Security - IP Security Architecture, Authentication Header, Encapsulating Security Payload, Benefits, Applications; Web Security - Secure Socket Layer, Secure Electronic Transaction –SSL Vs SET, Firewalls -Design Principles, Characteristics, Types of Firewalls: Virus and Antivirus approaches. Max. 45 Hrs. COURSE OUTCOMES On completion of the course, student will be able to CO1 - Analyze the vulnerabilities in any computing system and hence be able to design a security solution. CO2 - Identify the security issues in the network and resolve it. CO3 - Evaluate security mechanisms using rigorous approaches, including theoretical. CO4 - Compare and Contrast different IEEE standards and electronic mail security. CO5 - Understand the various symmetric key cryptographic techniques. CO6 - Apply the various cryptographic algorithm for emails and web security. TEXT / REFERENCE BOOKS 1. Atul Kahate, “Cryptography and Network Security”, 2nd Edition, Tata McGraw Hill Education Pvt. Ltd., New Delhi, 2011. 2. William Stallings, “Cryptography and Network Security - Principles and Practices”, 4th Edition, Prentice Hall of India Pvt. Ltd., New Delhi, 2006. 3. Behrouz A. Forouzan, “Cryptography & Network Security”, Tata McGraw Hill, 2007. 4. Niels Ferguson and Bruce Schneier, “Practical Cryptography”, John Wiley & Sons, 2003. 5. Niels Ferguson, Bruce Schneier, Tadayoshi Kohno, “Cryptography Engineering- Design Principles and Practical Applications”, Wiley Publishing Inc, Indiana, 2010. 6. Douglas R Simson “Cryptography – Theory and practice”, 1st Edition, CRC Press, 1995. END SEMESTER EXAMINATION QUESTION PAPER PATTERN Max. Marks: 100 Exam Duration: 3 Hrs. PART A: 10 Questions of 2 marks each - No choice 20 Marks PART B: 2 Questions from each unit of internal choice, each carrying 16 marks 80 Marks |
|