Subject Details
Dept     : CST
Sem      : 5
Regul    : 2019
Faculty : M.Kanchana
phone  : NIL
E-mail  : snscecet03
269
Page views
35
Files
2
Videos
3
R.Links

Icon
Syllabus

UNIT
1
Introduction

Security trends - Legal, Ethical and Professional Aspects of Security, Need for Security at Multiple levels, Security Policies - Model of network security – Security attacks, services and mechanisms – OSI security architecture – Classical encryption techniques: substitution techniques, transposition techniques, steganography).- Foundations of modern cryptography: perfect security – information theory – product cryptosystem – cryptanalysis.

UNIT
2
SYMMETRIC CRYPTOGRAPHY

MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures - Modular arithmetic-Euclid‟s algorithm- Congruence and matrices - Groups, Rings, Fields- Finite fields- SYMMETRIC KEY CIPHERS: SDES – Block cipher Principles of DES – Strength of DES – Differential and linear cryptanalysis - Block cipher design principles – Block cipher mode of operation – Evaluation criteria for AES – Advanced Encryption Standard - RC4 – Key distribution.

UNIT
3
PUBLIC KEY CRYPTOGRAPHY

MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing – Factorization – Euler’s totient function, Fermat’s and Euler’s Theorem - Chinese Remainder Theorem – Exponentiation and logarithm - ASYMMETRIC KEY CIPHERS: RSA cryptosystem – Key distribution – Key management – Diffie Hellman key exchange - ElGamal cryptosystem – Elliptic curve arithmetic-Elliptic curve cryptography.

UNIT
4
MESSAGE AUTHENTICATION AND INTEGRITY

Authentication requirement – Authentication function – MAC – Hash function – Security of hash function and MAC – SHA –Digital signature and authentication protocols – DSS- Entity Authentication: Biometrics, Passwords, Challenge Response protocols- Authentication applications - Kerberos, X.509

UNIT
5
SECURITY PRACTICE AND SYSTEM SECURITY

Mail Security: PGP-S/MIME. IP Security: Architecture, Authentication header, encapsulating security payloads, combining security associations, key management. Web Security: Secure socket layer and transport layer security, secure electronic transaction (SET). System Security: Intruders, Viruses and related threads, firewall design principals, trusted systems.

Reference Book:

1.C K Shyamala, N Harini and Dr. T R Padmanabhan: Cryptography and Network Security, Wiley India Pvt.Ltd 2.Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: PRIVATE Communication in a PUBLIC World, Prentice Hall, ISBN 0-13-046019-2 3.Johannes A. Buchmann, “Introduction to Cryptography”, Springer-Verlag. 3. Bruce Schiener, “Applied Cryptography.

Text Book:

William Stallings, Cryptography and Network Security: Principles and Practice, PHI 3rd Edition, 2006. BehrouzA.Foruzan, Cryptography and Network Security, Tata McGraw Hill 2007. William Stallings, Cryptography and Network Security: Principles and Practice, PHI 3rd Edition, 2006. BehrouzA.Foruzan, Cryptography and Network Security, Tata McGraw Hill 2007. 1.William Stallings, Cryptography and Network Security: Principles and Practice, PHI 3rd Edition, 2006. 2.BehrouzA.Foruzan, Cryptography and Network Security, Tata McGraw Hill 2007.