About Me

header ads

CRYPTOGRAPHY & NETWORK SECURITY (BCS703)

CRYPTOGRAPHY & NETWORK SECURITY

Course Code BCS703 
CIE Marks 50
Teaching Hours/Week (L:T:P: S) 4:0:0:0 
SEE Marks 50
Total Hours of Pedagogy 50 
Total Marks 100
Credits 04 
Exam Hours 3
Examination type (SEE) Theory




Module-1 

A model for Network Security, Classical encryption techniques: Symmetric cipher model,

Substitution ciphers-Caesar Cipher, Monoalphabetic Cipher, Playfair Cipher, Hill Cipher,

Polyalphabetic Ciphers, One time pad, Steganography.

Block Ciphers and Data Encryption Standards: Traditional Block Cipher structures, data

Encryption Standard (DES), A DES Example, The strength of DES, Block cipher design

principles.

Chapter 1: 1.8 Chapter 3: 3.1, 3.2, 3.5 Chapter 4: 4.1, 4.2, 4.3, 4.4, 4.5




Module-2 

Pseudorandom number Generators: Linear Congruential Generators, Blum Blum Shub

Generator.

Public key cryptography and RSA: Principles of public key cryptosystems-Public key

cryptosystems, Applications for public key cryptosystems, Requirements for public key

cryptography, Public key Cryptanalysis, The RSA algorithm: Description of the Algorithm,

Computational aspects, The Security of RSA.

Diffie-Hellman key exchange: The Algorithm, Key exchange Protocols, Man-in-the-middle

Attack, Elliptic Curve Cryptography: Analog of Diffie-Hellman key Exchange, Elliptic

Curve Encryption/Decryption, Security of Elliptic Curve Cryptography.

Chapter 8: 8.2 Chapter 9: 9.1, 9.2 Chapter 10: 10.1, 10.4




Module-3 

Applications of Cryptographic Hash functions, Two simple Hash functions, Key

management and distribution: Symmetric key distribution using symmetric encryption,

Symmetric key distribution using asymmetric encryption, Distribution of public keys, X.509

Certificates, Public Key Infrastructures

Chapter 11: 11.1, 11.2 Chapter 14: 14.1, 14.2, 14.3, 14.4, 14.5




Module-4

User Authentication: Remote user authentication principles, Kerberos, Remote user

authentication using asymmetric encryption.

Web security consideration, Transport layer security.

Email Threats and comprehensive email security, S/MIME, Pretty Good Privacy.

Chapter 15: 15.1, 15.3, 15.4 Chapter 17: 17.1, 17.2 Chapter 19: 19.3, 19.4, 19.5




Module-5 

Domainkeys Identified Mail.

IP Security: IP Security overview, IP Security Policy, Encapsulating Security Payload,

Combining security associations, Internet key exchange.

Chapter 19: 19.9 Chapter 20: 20.1, 20.2, 20.3, 20.4, 20.5




Text Books:

William stallings, “Cryptography and Network Security”, Pearson Publication, Seventh Edition.



References:

1. Keith M Martin, “Everyday Cryptography”, Oxford University Press

2. V.K Pachghare,“Cryptography and Network Security”, PHI, 2nd Edition 

Post a Comment

0 Comments