Course Objectives:
The course will enable the students to understand network security & various encryption techniques.
Course | Learning outcome (at course level) | Learning and teaching strategies | Assessment Strategies | |
Course Code | Course title | |||
25DCAI 701B |
CRYPTOGRAPHY & NETWORK SECURITY (Theory) | CO97. Elaborate network security services and mechanisms CO98.Compare various cryptographic algorithms CO99. Interpret message authentication and hash functions CO100. Assess security at various layers. CO101. Implement intrusion detection using firewall. CO102. Contribute effectively in course-specific interaction | Approach in teaching: Interactive Lectures, Discussion, PowerPoint Presentations, Informative videos
Learning activities for the students: Self-learning assignments, Effective questions, presentations.
| Assessment tasks will include Class Test on the topics, Semester end examinations, Quiz, Student presentations and assignments. |
Information Security: Introduction, History of Information security, Components of Information System. Network Security: Services, Mechanism and Attacks, The OSI security Architecture, Model of Network Security.
Cryptography:
Concepts and Techniques, symmetric and asymmetric key cryptography, steganography, Symmetric key Ciphers: DES structure, DES Analysis, Security of DES, variants of DES, Block cipher modes of operation, AES structure, Analysis of AES, Key distribution Asymmetric key Ciphers: Principles of public key cryptosystems, RSA algorithm, Analysis of RSA, Diffie-Hellman Key exchange.
Message Authentication and Hash Functions:
Authentication requirements and functions, MAC and Hash Functions, MAC Algorithms: Secure Hash Algorithm, Whirlpool, HMAC, Digital signatures, X.509, Kerberos. Digital Signatures-introductions and Algorithms for Digital signatures(DSA) and Digital Signature Standard(DSS).
Security at layers (Network, Transport, Application):
IPSecurity-IPv4 & IPv6,IPsec Architecture and operations, web- Secure Socket Layer(SSL), Transport Layer Security(TLS), Secure Electronic Transaction(SET), Pretty Good Privacy(PGP), S/MIME.
Firewall And Intrusion:
Computer Intrusions: Introduction, Intrusion Detection System and its types, Password Management, Limitations and Challenges. Malicious Software-Viruses, Worms, Trojan, spyware, Bots.
Firewall Introduction, Characteristics and types, Benefits and limitations. Firewall architecture, Trusted Systems, Access Control.
Suggested Text Books:
Suggested Reference Books:
Reference Journals:
e-Resources including links
Links:
[1] https://csit.iisuniv.ac.in/courses/subjects/cryptography-network-security-1
[2] https://www.tutorialspoint.com/cryptography/index.htm
[3] https://mindmajix.com/cryptography-tutorial
[4] https://www.gatevidyalay.com/tag/cryptography-and-network-security-tutorial/
[5] https://csit.iisuniv.ac.in/academic-year/2025-26