Subject Details
Dept     : IT
Sem      : 6
Regul    : 2019
Faculty : Ms Padmapriya R
phone  : NIL
E-mail  : padmapirya.r.it@snsct.org
255
Page views
22
Files
0
Videos
1
R.Links

Icon
Syllabus

UNIT
1
INTRODUCTION TO ENCRYPTION STANDARD

Computer Security Concepts - The OSI Security Architecture-Security Attacks - A Model for Network Security - Symmetric Cipher Model - Substitution Techniques - Transposition Techniques – Block Cipher Principles - Data Encryption Standard (DES) - Example - Multiple Encryption and Triple DES - Stream Ciphers - RC4 Lab Practice: 1. Implementation of Classical Encryption Technique 2. Implementation of Substitution Ciphers and Symmetric Cryptosystems 3. Implementation of Data Encryption Standard (DES)

UNIT
2
NUMBER THEORY AND PUBLIC KEY CRYPTOGRAPHY

Principles of Pseudorandom Number Generation - Pseudorandom Number Generators -Divisibility and the Division Algorithm - The Euclidean Algorithm - Modular Arithmetic - The Chinese Remainder Theorem - Principles of Public Key Cryptosystems - The RSA Algorithm - Diffie Hellman Key Exchange - ElGamal Cryptosystem Lab Practice: 1. Implementation of Euclidean Algorithm 2. Implementation of RSA Algorithm 3. Implementation of Diffie - Hellman Key Exchange

UNIT
3
HASH FUNCTION AND DIGITAL SIGNATURE

Cryptographic Hash Functions - Two Simple Hash Functions Requirements and Security - Hash Functions Based on Cipher Block Chaining - Secure Hash Algorithm (SHA) - Message Authentication Codes - Message Authentication Requirements - Message Authentication Codes - Security of MACs - MACs Based on Hash Functions (HMAC) - Digital Signatures - ElGamal Digital Signature Scheme - Schnorr Digital Signature Scheme - Digital Signature Standard (DSS) Lab Practice: 1. Implementation of SHA and MAC 2. Implementation of Digital Signature

UNIT
4
INTERACTIVE TECHNIQUES AND TOOLS

Key Management And Distribution - Symmetric Key Distribution Using Asymmetric Encryption - Distribution of Public Keys - X.509 Certificates - Public Key Infrastructure - User Authentication Protocols - Remote User Authentication Principles - Remote User Authentication Using Symmetric Encryption - Email Security Pretty Good Privacy (PGP) - S/MIME Lab Practice: 1. Implementation of Steganography 2. Implementation of PGP and Public key Distribution

UNIT
5
TRANSPORT LEVEL SECURITY AND SYSTEM SECURITY

Web Security Issues - Secure Sockets Layer (SSL) - Transport Layer Security (TLS) – HTTPS - Secure Shell (SSH) - IP Security Overview - Policy - Encapsulating Security Payload – Intruders - Intrusion Detection - Malicious Software – Viruses – Worms – Kerberos - Firewalls - The Need for Firewall - Types of Firewall - Firewall Configurations Lab Practice: 1. Implementation of SSL 2. Implementation of SSH and TLS

Reference Book:

Behrouz A. Ferouzan, “Cryptography & Network Security”, 2nd Edition, Tata Mc Graw Hill, 1 2011 Man Young Rhee, “Internet Security: Cryptographic Principles”, “Algorithms and Protocols”, 2nd 2 Edition, Wiley Publications, 2003 3 Charles Pfleeger, “Security in Computing”, 4th Edition, Prentice Hall of India, 2006 4 Ulysess Black, “Internet Security Protocols”, 2nd Edition, Pearson Education Asia, 2000

Text Book:

1 William Stallings, “Cryptography and Network Security”, 6th Edition, Pearson Education, 2013 Charlie Kaufman, Radia Perlman and Mike Speciner, “Network Security”, 2nd Edition, Prentice 2 Hall of India, 2002