CRYPTOGRAPHY & NETWORK SECURITY

Paper Code: 
DCAI 701B
Credits: 
03
Periods/week: 
03
Max. Marks: 
100.00
Objective: 

This course is designed to help students to understand network security & various encryption techniques.

 

Learning Outcome

Learning and Teaching Strategies

Assessment Strategies 

The students will: -

CO81. Describe network security services and mechanisms

CO82.Compare various cryptographic algorithms

CO83. Interpret message authentication and hash functions

CO84. Assess security at various layers.

CO85. Analyze intrusion detection problem.

Approach in teaching:

Interactive Lectures, Discussion, Tutorials, Reading assignments, Demonstration,

 

Learning activities for the students: Self-learning              assignment, Effective questions, Simulation, Seminar presentation, Giving tasks.

Class   test, Semester end        examinations,

Quiz, Solving problems in tutorials, Assignments, Presentation

 

 

9.00
Unit I: 

Information Security 

Introduction, History of Information security, Components of Information System. Network Security: Services, Mechanism and Attacks, The OSI security Architecture, Model of Network Security.

 

9.00
Unit II: 

Cryptography:       

Concepts and Techniques, symmetric and asymmetric key cryptography, steganography, Symmetric key Ciphers: DES structure, DES Analysis, Security of DES, variants of DES, Block cipher modes of operation, AES structure, Analysis of AES, Key distribution Asymmetric key Ciphers: Principles of public key cryptosystems, RSA algorithm, Analysis of RSA, Diffie-Hellman Key exchange.

9.00
Unit III: 

Message Authentication and Hash Functions

Authentication requirements and functions, MAC and Hash Functions, MAC Algorithms: Secure Hash Algorithm, Whirlpool, HMAC, Digital signatures, X.509, Kerberos. Digital Signatures-introductions and Algorithms for Digital signatures(DSA) and Digital Signature Standard(DSS).

9.00
Unit IV: 

Security at layers (Network, Transport, Application)  

IPSecurity-IPv4 & IPv6,IPsec Architecture and operations, web- Secure Socket Layer(SSL), Transport Layer Security(TLS), Secure Electronic Transaction(SET), Pretty Good Privacy(PGP), S/MIME.

9.00
Unit V: 

Firewall And Intrusion

Computer Intrusions: Introduction, Intrusion Detection System and its types, Password Management, Limitations and Challenges. Malicious Software-Viruses, Worms, Trojan, spyware, Bots.

Firewall Introduction, Characteristics and types, Benefits and limitations. Firewall architecture, Trusted Systems, Access Control.

 

 

ESSENTIAL READINGS: 
  • Bernard Menezes, “Network Security and Cryptography”, Cengage Learning India, 2014, ISBN-13  ‎ 978-8131513491.
  • Nina Godbole, Sunit Belapure, “Cyber Security”, Wiley India, 2014, ISBN-13 No.:9788126521791.

 

REFERENCES: 

Suggested Reference Books

  • Eoghan Casey, “Digital Evidence and Computer Crime Forensic Science, Computers and the Internet”, ELSEVIER, 2011, ISBN 978-0- 12-374268-1
  • Atul Kahate, “Cryptography and Network Security”, Mc Graw Hill Publication, 2nd Edition, 2008, ISBN : 978-0-07-064823-4
  • William Stallings, “Cryptography and network security principles and practices”, Pearson, 6th       Edition, ISBN : 978-93-325-1877-3
  • Forouzan, “Cryptography and Network Security (SIE)”, Mc Graw Hill, ISBN, 007070208X, 9780070702080
  • Dr. Nilakshi Jain-Digital Forensic: The Fascinating World of Digital Evidences-Wiley India-ISBN: 9788126565740

 

E-Resources including links

 

 

 

Academic Year: