Teaching Scheme (in Hours)
Theory |
Tutorial |
Practical |
Total |
4 |
0 |
2 |
6 |
Subject Credit : 6
Examination Scheme (in Marks)
Theory
ESE (E)
|
Theory
PA (M)
|
Practical
ESE Viva (V)
|
Practical
PA (I)
|
Total
|
70 |
30 |
30 |
20 |
150 |
Syllabus Content
Unit-1: Introduction
Symmetric Cipher Model, Cryptography, Cryptanalysis and Attacks; Substitution and Transposition techniques
Unit-2: Stream ciphers and block ciphers
Stream ciphers and block ciphers, Block Cipher structure, Data Encryption standard (DES) with example, strength of DES, Design principles of block cipher, AES with structure, its transformation functions, key expansion, example and implementation
Unit-3: Multiple encryption and triple DES
Multiple encryption and triple DES, Electronic Code Book, Cipher Block Chaining Mode, Cipher Feedback mode, Output Feedback mode, Counter mode
Unit-4: Public Key Cryptosystems
Public Key Cryptosystems with Applications, Requirements and Cryptanalysis, RSA algorithm, its computational aspects and security, Diffie-Hillman Key Exchange algorithm, Man-in-Middle attack
Unit-5: Cryptographic Hash Functions
Cryptographic Hash Functions, their applications, Simple hash functions, its requirements and security, Hash functions based on Cipher Block Chaining, Secure Hash Algorithm (SHA)
Unit-6: Message Authentication Codes
Message Authentication Codes, its requirements and security, MACs based on Hash Functions, Macs based on Block Ciphers
Unit-7: Digital Signature, its properties
Digital Signature, its properties, requirements and security, various digital signature schemes (Elgamal and Schnorr), NIST digital Signature algorithm
Unit-8: Key management and distribution
Key management and distribution, symmetric key distribution using symmetric and asymmetric encryptions, distribution of public keys, X.509 certificates, Public key infrastructure
Unit-9: Remote user authentication with symmetric and asymmetric encryption
Remote user authentication with symmetric and asymmetric encryption, Kerberos
Unit-10: Web Security threats and approaches
Web Security threats and approaches, SSL architecture and protocol, Transport layer security, HTTPS and SSH
Reference Books
Sr. |
Title |
Author |
Publication |
Amazon Link |
1 |
Cryptography And Network Security |
WilliamStallings, Pearson |
|
|
2 |
Information Security Principles and Practice |
Mark Stamp |
|
|
3 |
Cryptography & Network Security |
Forouzan, Mukhopadhyay |
McGrawHil |
|
4 |
Cryptography & Network Security |
Forouzan, Mukhopadhyay |
McGrawHil |
|
5 |
Cryptography and Security |
C K Shyamala, N Harini,C K Shyamala, N Harini |
Wiley-India |
|
6 |
Information Systems Security |
Godbole |
Wiley-India |
|
7 |
Information Security Principles and Practice |
Deven Shah |
Wiley-India |
|
8 |
Security in Computing |
Pfleeger and Pfleeger |
PHI |
|
9 |
Build Your Own Security Lab : A Field Guide for network testing |
Michael Gregg |
Wiley India |
|