Cryptology & Information Security

Paper Code: 
MIT 323
Credits: 
04
Periods/week: 
04
Max. Marks: 
100.00
Objective: 

This course is aimed at developing an understanding of security aspects related to network & cybersecurity.

12.00
Unit I: 

Introduction: Attacks, Services and Mechanism, Model for Internetwork Security, Internet standards and RFCs; Cryptography Basics: Conventional Encryption Principles (Cryptography, Cryptanalysis) & Algorithms : Data Encryption Standard, DES, Cipher Block Modes of Operation (Cipher Block Chaining & Cipher Feedback Mode) and their implementation, Location of Encryption Devices, Key Distribution.

12.00
Unit II: 

Conventional Encryption Algorithm: Triple DES, AES (With Implementation), Blowfish, International Data Encryption Algorithm (IDEA), RC5, RC2, Placement and Encryption Function, Key Distribution, Random Number generation & its implementation.

12.00
Unit III: 

Public Key Encryption: Public Key Cryptography: Principles of Public Key Cryptosystems, RSA Algorithm and its Implementation, Key Management, Fermat’s and Euler’s Theorem, Diffie- Hellman Key Exchange Algorithm and its implementation.

12.00
Unit IV: 

Information Security: Components and Critical Characteristics of an Information System, History and Need of Information Security, NSTISSC Security Model, Securing the Components, Balancing Security and Access, The Security SDLC , Business Needs, Threats, Attacks, Legal, Ethical and Professional Issues, Risk Management: Identifying and Assessing Risk, Assessing and Controlling Risk

12.00
Unit V: 

Cyber Security: Laws, Investigation and Ethics: Cyber Crime, Information Security and Law, Types & overview of Cyber Crimes, Cyber Law Issues in E-Business Management, Overview of Indian IT Act 2000, Copy Right, Patents, Data Privacy and Protection, Domain Name System, Software piracy, Plagiarism, Ethical Hacking and its Issues.

ESSENTIAL READINGS: 

1. William Stallings, "Network Security Essentials: Applications and Standards", Prentice

Hall of India.

2. V.K. Pachghare, “Cryptography and Information Security”, 4th edition,PHI Learning Limited, 2008.

3. Sunit Belapur and Nina Godbole, “Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives”, Wiley India Pvt Ltd, 2011.

REFERENCES: 

William Stallings, "Network Security & Cryptology", Prentice Hall of India.

Academic Year: