Cryptography and Network Security

Paper Code: 
MCA 422
Credits: 
04
Periods/week: 
04
Max. Marks: 
100.00
Objective: 
  • To understand the fundamentals of Cryptography 
  • To acquire knowledge on standard algorithms used to provide confidentiality, integrity and Authenticity.
  • To understand how to deploy encryption techniques to secure data in transit across data
14.00
Unit I: 
Introduction to security attacks

services and mechanism, classical encryption techniques- substitution ciphers and transposition ciphers, cryptanalysis, stream and block ciphers. Modern Block Ciphers: Block ciphers principals, Shannon’s theory of confusion and diffusion, fiestal structure, data encryption standard(DES), differential and linear cryptanalysis of DES, block cipher modes of operations, triple DES.

12.00
Unit II: 
Encryption Tchnique

AES, RC6, random number generation. S-box theory: Boolean Function, S-box design criteria, Bent functions, Propagation and nonlinearity, construction of balanced functions, S-box design.

14.00
Unit III: 
Public Key Cryptosystems:

Principles of Public Key Cryptosystems, RSA Algorithm, security analysis of RSA, Exponentiation in Modular Arithmetic. Key Management in Public Key Cryptosystems: Distribution of Public Keys, Distribution of Secret keys using Public Key Cryptosystems. X.509 Discrete Logarithms, Diffie-Hellman Key Exchange

10.00
Unit IV: 
Message Authentication and Hash Function:

Authentication requirements, authentication functions, message authentication code, hash functions, birthday attacks, security of hash functions and MAC, MD5 message digest algorithm, Secure hash algorithm(SHA). Digital Signatures: Digital Signatures, authentication protocols, digital signature standards (DSS), proof of digital signature algorithm. Remote user Authentication using symmetric and Asymmetric Authentication

10.00
Unit V: 
Pretty Good Privacy.

IP Security: Overview, IP Security Architecture, Authentication Header, Encapsulation Security Payload in Transport and Tunnel mode with multiple security associations (Key Management not Included). Strong Password Protocols: Lamport’s Hash, Encrypted Key Exchange.

ESSENTIAL READINGS: 
  • Stalling Williams: Cryptography and Network Security: Principles and Practices, 4th Edition, Pearson Education, 2006
  • Kaufman Charlie et.al; Network Security: Private Communication in a Public World, 2nd Ed., PHI/Pearson
REFERENCES: 
  • Pieprzyk Josef and et.al; Fundamentals of Computer Security, Springer-Verlag, 2008
  • Trappe & Washington, Introduction to Cryptography, 2nd Ed. Pearson.
Academic Year: