DATA SECURITY AND PRIVACY
Course Code BAD703 
CIE Marks 50
Teaching Hours/Week (L:T:P: S) 4:0:0:0 
SEE Marks 50
Total Hours of Pedagogy 50 
Total Marks 100
Credits 04 
Exam Hours 3
Examination type (SEE) Theory
Module-1
A model for Network Security, Classical encryption techniques: Symmetric cipher model,
Substitution ciphers-Caesar Cipher, Monoalphabetic Cipher, Playfair Cipher, Hill Cipher,
Polyalphabetic Ciphers, One time pad, Steganography
Block Ciphers and Data Encryption Standards: Traditional Block Cipher structures, data
Encryption Standard (DES), A DES Example, The strength of DES, Block cipher design
principles
Module-2
Pseudorandom number Generators: Linear Congruential Generators, Blum Blum Shub
Generator
Public key cryptography and RSA: Principles of public key cryptosystems-Public key
cryptosystems, Applications for public key cryptosystems, Requirements for public key
cryptography, Public key Cryptanalysis, The RSA algorithm: Description of the Algorithm,
Computational aspects, The Security of RSA
Diffie-Hellman key exchange: The Algorithm, Key exchange Protocols, Man-in-the-middle
Attack, Elliptic Curve Cryptography: Analog of Diffie-Hellman key Exchange, Elliptic
Curve Encryption/Decryption, Security of Elliptic Curve Cryptography
Module-3
Key management fundamentals, Key lengths and lifetimes, Key generation, Key
establishment, Key storage, Key usage, Governing key management.
Public-Key Management: Certification of public keys, The certificate lifecycle, Public-key
management models, Alternative approaches.
Module-4
Web security consideration, Transport layer security.
IP Security: IP Security overview, IP Security Policy, Encapsulating Security Payload,
Combining security associations, Internet key exchange.
Module-5
Data Security: Data hiding in Text-Basic features, Applications of data hiding,
Watermarking, Intuitive Methods, Simple Digital methods, Data hiding in Text, Innocuous
Text, Mimic Functions.
Data hiding in Images: LSB encoding, BPCS Steganography, Lossless data hiding
Suggested Learning Resources:
Textbook
1. Cryptography and Network Security”, William Stallings, Pearson Publication, Seventh
Edition.
2. Everyday Cryptography: Fundamental Principles and Applications Keith M. Martin Oxford
Scholarship Online: December 2013.
3. Data Privacy and Security, Salomon, David, Springer, 2003.
Reference Books:
1. Cryptography and Network Security, Behrouz A Forouzan, Dedeep Mukhopadhyay,
TMH, 2nd edition, 2013
2. Information Security: Principles and practice, Mark Stamp, Wiley Inter Science, 2011

.png)
0 Comments