Course Objectives:
The course will enable the students to understand network security & various encryption techniques.
Course | Learning outcome (at course level) | Learning and teaching strategies | Assessment Strategies | |
Course Code | Course title | |||
24DCAI 701B |
CRYPTOGRAPHY & NETWORK SECURITY (Theory) | CO97. Elaborate network security services and mechanisms CO98.Compare various cryptographic algorithms CO99. Interpret message authentication and hash functions CO100. Assess security at various layers. CO101. Implement intrusion detection using firewall. CO102. Contribute effectively in course-specific interaction | Approach in teaching: Interactive Lectures, Discussion, PowerPoint Presentations, Informative videos
Learning activities for the students: Self-learning assignments, Effective questions, presentations.
| Assessment tasks will include Class Test on the topics, Semester end examinations, Quiz, Student presentations and assignments. |
Introduction, History of Information security, Components of Information System. Network Security: Services, Mechanism and Attacks, The OSI security Architecture, Model of Network Security.
Concepts and Techniques, symmetric and asymmetric key cryptography, steganography, Symmetric key Ciphers: DES structure, DES Analysis, Security of DES, variants of DES, Block cipher modes of operation, AES structure, Analysis of AES, Key distribution Asymmetric key Ciphers: Principles of public key cryptosystems, RSA algorithm, Analysis of RSA, Diffie-Hellman Key exchange.
Authentication requirements and functions, MAC and Hash Functions, MAC Algorithms: Secure Hash Algorithm, Whirlpool, HMAC, Digital signatures, X.509, Kerberos. Digital Signatures-introductions and Algorithms for Digital signatures(DSA) and Digital Signature Standard(DSS).
IPSecurity-IPv4 & IPv6,IPsec Architecture and operations, web- Secure Socket Layer(SSL), Transport Layer Security(TLS), Secure Electronic Transaction(SET), Pretty Good Privacy(PGP), S/MIME.
Computer Intrusions: Introduction, Intrusion Detection System and its types, Password Management, Limitations and Challenges. Malicious Software-Viruses, Worms, Trojan, spyware, Bots.
Firewall Introduction, Characteristics and types, Benefits and limitations. Firewall architecture, Trusted Systems, Access Control.
Suggested Text Books:
Suggested Reference Books:
1. Eoghan Casey, “Digital Evidence and Computer Crime Forensic Science, Computers and the Internet”, ELSEVIER, 2011, ISBN 978-0- 12-374268-1
2. Atul Kahate, “Cryptography and Network Security”, Mc Graw Hill Publication, 2nd Edition, 2008, ISBN : 978-0-07-064823-4
3. William Stallings, “Cryptography and network security principles and practices”, Pearson, 6th Edition, ISBN : 978-93-325-1877-3
4. Forouzan, “Cryptography and Network Security (SIE)”, Mc Graw Hill, ISBN, 007070208X, 9780070702080
5. Dr. Nilakshi Jain-Digital Forensic: The Fascinating World of Digital Evidences-Wiley India-ISBN: 9788126565740
Reference Journals:
1. Journal of the Brazilian Computer Society, Springer Open
2. Journal of Internet Services and Applications, Springer Open
e-Resources including links
1. https://www.tutorialspoint.com/cryptography/index.htm
2. https://mindmajix.com/cryptography-tutorial
https://www.gatevidyalay.com/tag/cryptography-and-network-security-tutorial/