Computer Science & IT
Published on Computer Science & IT (https://csit.iisuniv.ac.in)

Home > Cryptography and Network Security

Cryptography and Network Security [1]

Paper Code: 
MCA 422
Credits: 
04
Periods/week: 
04
Max. Marks: 
100.00
Objective: 

·         To understand the fundamentals of Cryptography 

·         To acquire knowledge on standard algorithms used to provide confidentiality, integrity and

               Authenticity.

    .·  To understand how to deploy encryption techniques to secure data in transit across data

14.00
Unit I: 

Introduction to security attacks: services and mechanism, classical encryption techniques- substitution ciphers and transposition ciphers, cryptanalysis, stream and block ciphers. Modern Block Ciphers: Block ciphers principals, Shannon’s theory of confusion and diffusion, fiestal structure, data encryption standard(DES), differential and linear cryptanalysis of DES, block cipher modes of operations, triple DES.

 

12.00
Unit II: 

Encryption Tchnique:AES, RC6, random number generation. S-box theory: Boolean Function, S-box design criteria, Bent functions, Propagation and nonlinearity, construction of balanced functions, S-box design.

 

14.00
Unit III: 

Public Key Cryptosystems: Principles of Public Key Cryptosystems, RSA Algorithm, security analysis of RSA, Exponentiation in Modular Arithmetic. Key Management in Public Key Cryptosystems: Distribution of Public Keys, Distribution of Secret keys using Public Key Cryptosystems. X.509 Discrete Logarithms, Diffie-Hellman Key Exchange

 

10.00
Unit IV: 

Message Authentication and Hash Function: Authentication requirements, authentication functions, message authentication code, hash functions, birthday attacks, security of hash functions and MAC, MD5 message digest algorithm, Secure hash algorithm(SHA). Digital Signatures: Digital Signatures, authentication protocols, digital signature standards (DSS), proof of digital signature algorithm. Remote user Authentication using symmetric and Asymmetric Authentication

 

10.00
Unit V: 

Pretty Good Privacy. IP Security: Overview, IP Security Architecture, Authentication Header, Encapsulation Security Payload in Transport and Tunnel mode with multiple security associations (Key Management not Included). Strong Password Protocols: Lamport’s Hash, Encrypted Key Exchange.

 

ESSENTIAL READINGS: 
  • . Stalling Williams: Cryptography and Network Security: Principles and Practices, 4th Edition, Pearson Education, 2006
  • Kaufman Charlie et.al; Network Security: Private Communication in a Public World, 2nd Ed., PHI/Pearson

 

REFERENCES: 
  • Pieprzyk Josef and et.al; Fundamentals of Computer Security, Springer-Verlag, 2008
  • Trappe & Washington, Introduction to Cryptography, 2nd Ed. Pearson.

 

Academic Year: 
2016-17 [2]

Footer Menu

  • Home
  • Univ Home
  • Contact Us
  • About Us
  • Site Map
  • Downloads
  • Feedback
  • Jobs
  • Site Login

Follow Computer Science & IT on:

Facebook Twitter YouTube

IIS (Deemed to be University)

Gurukul Marg, SFS, Mansarovar, Jaipur 302020, (Raj.) India Phone:- +91-141-2400160-61, 2397906-07, Fax: 2395494, 2781158


Source URL: https://csit.iisuniv.ac.in/courses/subjects/cryptography-and-network-security-3

Links:
[1] https://csit.iisuniv.ac.in/courses/subjects/cryptography-and-network-security-3
[2] https://csit.iisuniv.ac.in/academic-year/2016-17