CRYPTOLOGY & INFORMATION SECURITY

Paper Code: 
MIT 323
Credits: 
04
Periods/week: 
04
Max. Marks: 
100.00
Objective: 

This course is aimed at developing an understanding of security aspects related to network & cyber security.

 

 

12.00

Introduction: Attacks, Services and Mechanism, Model for Internetwork Security, Internet standards and RFCs; Cryptography Basics: Conventional Encryption Principles (Cryptography, Cryptanalysis) & Algorithms : Data Encryption Standard, DES, Cipher Block Modes of Operation (Cipher Block Chaining & Cipher Feedback Mode) and their implementation, Location of Encryption Devices, Key Distribution.

 

12.00

Conventional Encryption Algorithm: Triple DES, AES (With Implementation), Blowfish, International Data Encryption Algorithm (IDEA), RC5, RC2, Placement and Encryption Function, Key Distribution, Random Number generation & its implementation.

 

12.00

Public Key Encryption: Public Key Cryptography: Principles of Public Key Cryptosystems, RSA Algorithm and its Implementation, Key Management, Fermat’s and Euler’s Theorem, Diffie- Hellman Key Exchange Algorithm and its implementation.

 

12.00

Information Security: Components and Critical Characteristics of an Information System, History and Need of Information Security, NSTISSC Security Model, Securing the Components, Balancing Security and Access, The Security SDLC , Business Needs, Threats, Attacks, Legal, Ethical and Professional Issues, Risk Management: Identifying and Assessing Risk, Assessing and Controlling Risk

 

12.00

Cyber Security: Laws, Investigation and Ethics: Cyber Crime, Information Security and Law, Types & overview of Cyber Crimes, Cyber Law Issues in E-Business Management, Overview of Indian IT Act 2000, Copy Right, Patents, Data Privacy and Protection, Domain Name System, Software piracy, Plagiarism, Ethical Hacking and its Issues.

 

ESSENTIAL READINGS: 
  1. William Stallings, "Network Security Essentials: Applications and Standards", Prentice Hall of India.

    2. V.K. Pachghare, “Cryptography and Information Security”, 4th edition,PHI Learning Limited, 2008.

    3. Sunit Belapur and Nina Godbole, “Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives”, Wiley India Pvt Ltd, 2011.

     

REFERENCES: 
  1. William Stallings, "Network Security & Cryptology", Prentice Hall of India.

Academic Year: