Diploma Website   Student Corner   Pay Fees   NIRF

Information and Network Security (2170709)

Teaching Scheme (in Hours)

Theory Tutorial Practical Total
4 0 2 6

Subject Credit :  6

Examination Scheme (in marks)

Theory
ESE (E)
Theory
PA (M)
Practical
ESE Viva (V)
Practical
PA (I)
Total
70 30 30 20 150

Syllabus Content    Download

Unit-1:  Introduction

Symmetric Cipher Model, Cryptography, Cryptanalysis and Attacks; Substitution and Transposition techniques

Unit-2:  Stream ciphers and block ciphers

Stream ciphers and block ciphers, Block Cipher structure, Data Encryption standard (DES) with example, strength of DES, Design principles of block cipher, AES with structure, its transformation functions, key expansion, example and implementation

Unit-3:  Multiple encryption and triple DES

Multiple encryption and triple DES, Electronic Code Book, Cipher Block Chaining Mode, Cipher Feedback mode, Output Feedback mode, Counter mode

Unit-4:  Public Key Cryptosystems

Public Key Cryptosystems with Applications, Requirements and Cryptanalysis, RSA algorithm, its computational aspects and security, Diffie-Hillman Key Exchange algorithm, Man-in-Middle attack

Unit-5:  Cryptographic Hash Functions

Cryptographic Hash Functions, their applications, Simple hash functions, its requirements and security, Hash functions based on Cipher Block Chaining, Secure Hash Algorithm (SHA)

Unit-6:  Message Authentication Codes

Message Authentication Codes, its requirements and security, MACs based on Hash Functions, Macs based on Block Ciphers

Unit-7:  Digital Signature, its properties

Digital Signature, its properties, requirements and security, various digital signature schemes (Elgamal and Schnorr), NIST digital Signature algorithm

Unit-8:  Key management and distribution

Key management and distribution, symmetric key distribution using symmetric and asymmetric encryptions, distribution of public keys, X.509 certificates, Public key infrastructure

Unit-9:  Remote user authentication with symmetric and asymmetric encryption

Remote user authentication with symmetric and asymmetric encryption, Kerberos

Unit-10:  Web Security threats and approaches

Web Security threats and approaches, SSL architecture and protocol, Transport layer security, HTTPS and SSH

Reference Books

Sr. Title Author Publication Amazon Link
1 Cryptography And Network Security WilliamStallings, Pearson
2 Information Security Principles and Practice Mark Stamp
3 Cryptography & Network Security Forouzan, Mukhopadhyay McGrawHil
4 Cryptography & Network Security Forouzan, Mukhopadhyay McGrawHil
5 Cryptography and Security C K Shyamala, N Harini,C K Shyamala, N Harini Wiley-India
6 Information Systems Security Godbole Wiley-India
7 Information Security Principles and Practice Deven Shah Wiley-India
8 Security in Computing Pfleeger and Pfleeger PHI
9 Build Your Own Security Lab : A Field Guide for network testing Michael Gregg Wiley India

About Us

Darshan Institute of Engineering & Technology is a leading institute offering undergraduate (B.E.), postgraduate (M.E.) and Diploma programs in engineering.

Our Contacts

At Hadala, Rajkot - Morbi Highway,
Gujarat-363650, INDIA

(+91) 97277 47310
(+91) 97277 47311

More contact details