Subject Details
Dept     : CSE-IOT
Sem      : 3
Regul    : 2023
Faculty : Naveenraj M
phone  : 9566440459
E-mail  : naveenraj.m.iot@snsce.ac.in
163
Page views
25
Files
2
Videos
0
R.Links

Icon
Syllabus

UNIT
1
Introduction

Cyber Attacks, Defence Strategies and Techniques, Guiding Principles, Mathematical Background for Cryptography - Modulo Arithmetic’s, The Greatest Comma Divisor, Useful Algebraic Structures, Chinese Remainder Theorem, Basics of Cryptography - Preliminaries, Elementary Substitution Ciphers, Elementary Transport Ciphers, Other Cipher Properties, Secret Key Cryptography – Product Ciphers, DES Construction 1. Write a program to implement the following cipher techniques to perform encryption and decryption i). Caesar Cipher ii). Playfair Cipher iii). Hill Cipher

UNIT
2
Public Key Cryptography and RSA

RSA Operations, Why Does RSA Work?, Performance, Applications, Practical Issues, Public Key Cryptography Standard (PKCS), Cryptographic Hash - Introduction, Properties, Construction, Applications and Performance, The Birthday Attack, Discrete Logarithm and its Applications - Introduction, Diffie-Hellman Key Exchange, Other Applications 2.Write a program to implement the Diffie-Hellman Key Exchange mechanism. Consider one of the parties as Alice and the other party as bob.

UNIT
3
Key Management

Introduction, Digital Certificates, Public Key Infrastructure, Identity–based Encryption, Authentication–I - One way Authentication, Mutual Authentication, Dictionary Attacks, Authentication – II – Centalised Authentication, The Needham-Schroeder Protocol, Kerberos, Biometrics, IPSecSecurity at the Network Layer – Security at Different layers: Pros and Cons, IPSec in Action, Internet Key Exchange (IKE) Protocol, Security Policy and IPSEC, Virtual Private Networks, Security at the Transport Layer - Introduction, SSL Handshake Protocol, SSL Record Layer Protocol, OpenSSL. 3. Write a program to implement digital signature standard.

UNIT
4
INTEGRITY AND AUTHENTICATION ALGORITHMS

Authentication requirement – Authentication function – MAC – Hash function – Security of hash function: HMAC, CMAC – SHA – Digital signature and authentication protocols – DSS – Schnorr Digital Signature Scheme – ElGamal cryptosystem – Entity Authentication: Biometrics, Passwords, Challenge Response protocols – Authentication applications – Kerberos MUTUAL TRUST: Key management and distribution – Symmetric key distribution using symmetric and asymmetric encryption – Distribution of public keys – X.509 Certificates. 4.Write a program to implement DES algorithm 5. Write a program to implement AES algorithm

UNIT
5
CYBER CRIMES AND CYBER SECURITY

Cyber Crime and Information Security – classifications of Cyber Crimes – Tools and Methods – Password Cracking, Keyloggers, Spywares, SQL Injection – Network Access Control – Cloud Security – Web Security – Wireless Security 6.Write a program to calculate the message digest of a text using the SHA-1 algorithm. 7. Write a program to calculate the message digest of a text using the MD-5 algorithm.

Reference Book:

1 Behrouz A. Ferouzan, Debdeep Mukhopadhyay, "Cryptography and Network Security", 3rd Edition, Tata Mc Graw Hill, 2022. 2 Charles Pfleeger, Shari Pfleeger, Jonathan Margulies, "Security in Computing", Fifth Edition, Prentice Hall, New Delhi, 2015.

Text Book:

1 William Stallings, "Cryptography and Network Security - Principles and Practice", Seventh Edition,PearsonEducation, 2020. 2 Nina Godbole, Sunit Belapure, “Cyber Security: Understanding Cybercrimes, Computer Forensics and Legal Perspectives”, First Edition, Wiley India, 2021.