About Me

header ads

DATA SECURITY AND PRIVACY (BAD703)

DATA SECURITY AND PRIVACY

Course Code BAD703 
CIE Marks 50
Teaching Hours/Week (L:T:P: S) 4:0:0:0 
SEE Marks 50
Total Hours of Pedagogy 50 
Total Marks 100
Credits 04 
Exam Hours 3
Examination type (SEE) Theory




Module-1 

A model for Network Security, Classical encryption techniques: Symmetric cipher model,

Substitution ciphers-Caesar Cipher, Monoalphabetic Cipher, Playfair Cipher, Hill Cipher,

Polyalphabetic Ciphers, One time pad, Steganography

Block Ciphers and Data Encryption Standards: Traditional Block Cipher structures, data

Encryption Standard (DES), A DES Example, The strength of DES, Block cipher design

principles




Module-2 

Pseudorandom number Generators: Linear Congruential Generators, Blum Blum Shub

Generator

Public key cryptography and RSA: Principles of public key cryptosystems-Public key

cryptosystems, Applications for public key cryptosystems, Requirements for public key

cryptography, Public key Cryptanalysis, The RSA algorithm: Description of the Algorithm,

Computational aspects, The Security of RSA

Diffie-Hellman key exchange: The Algorithm, Key exchange Protocols, Man-in-the-middle

Attack, Elliptic Curve Cryptography: Analog of Diffie-Hellman key Exchange, Elliptic

Curve Encryption/Decryption, Security of Elliptic Curve Cryptography




Module-3

Key management fundamentals, Key lengths and lifetimes, Key generation, Key

establishment, Key storage, Key usage, Governing key management.

Public-Key Management: Certification of public keys, The certificate lifecycle, Public-key

management models, Alternative approaches.




Module-4 

Web security consideration, Transport layer security.

IP Security: IP Security overview, IP Security Policy, Encapsulating Security Payload,

Combining security associations, Internet key exchange.




Module-5 

Data Security: Data hiding in Text-Basic features, Applications of data hiding,

Watermarking, Intuitive Methods, Simple Digital methods, Data hiding in Text, Innocuous

Text, Mimic Functions.

Data hiding in Images: LSB encoding, BPCS Steganography, Lossless data hiding




Suggested Learning Resources:

Textbook

1. Cryptography and Network Security”, William Stallings, Pearson Publication, Seventh

Edition.

2. Everyday Cryptography: Fundamental Principles and Applications Keith M. Martin Oxford

Scholarship Online: December 2013.

3. Data Privacy and Security, Salomon, David, Springer, 2003.



Reference Books:

1. Cryptography and Network Security, Behrouz A Forouzan, Dedeep Mukhopadhyay,

TMH, 2nd edition, 2013

2. Information Security: Principles and practice, Mark Stamp, Wiley Inter Science, 2011

Post a Comment

0 Comments