22SCE151Cryptography and Network Security

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

DEPARTMEN Computer Science and Engineering

T
Course Code 22SCE15 Total 4 Course Type Professional Elective Course
1 Credits
CourseTitle Cryptography and Network Security
Contact Credits Assessment in
Teaching Hours Weightage and marks
Learning Lecture 52 4 CIE SEE Total
Process
Tutorial 0 0 Weightage 40 % 60 % 100 %
Practical 0 0 Maximu 40 60 Marks 100
m Marks Marks Marks
Total 52 4 Minimum 20 25 marks 45 Marks
Marks marks
Note: *For passing the student has to score a minimum of 45 Marks (CIE+SEE: 20 + 25 or 21 + 24)

COURSE PREREQUISITE: Computer Networks.


COURSEOBJECTIVES:
Sl.
Course Objectives
No.
1. Understand the key concepts of cryptography.
2. Comprehend various applications of cryptography
3. Analyze the different cryptographic algorithms to provide better security.

COURSE OUTCOMES (COs)


Highest
Level of
CO# CourseOutcomes
Cognitiv
e Domain
CO1 Understand the concepts of cryptography L2
CO2 Understand and apply the concepts of public key cryptosystems and L3
hash functions
CO3 Apply the concepts of authentication functions and key distribution L3
techniques.
CO4 Analyze and implement protocols related to E-mail security and L4
web security
CO5 Analyze the security issues at network layer and evaluate system L4
security mechanisms
L1 – Remember, L2 – Understand, L3 – Apply, L4 – Analyze, L5 – Evaluate, L6 - Create

Course Content / Syllabus:


UNIT Hours
Content
No. Lecture
1. Overview of Cryptography: Introduction, Information security and 12
cryptography, Basic terminology and concepts, Symmetric key
encryption , Digital signatures, Public-key cryptography, Hash
functions, Protocols and mechanisms, Key establishment, management,
and certification, Pseudorandom numbers and sequences, Classes of
attacks and security models.
2. Public-Key Cryptography and Hash Functions: Public-Key 10
cryptography: Principles of Public-Key Cryptosystems, The RSA

16
Algorithm, Diffie-Hellman Key Exchange, Elliptic curve cryptography.
Cryptographic Hash Functions: Applications of Cryptographic Hash
Functions, Two simple hash functions, Secure Hash Algorithm (SHA).
3. Authentication and Key Management: Message Authentication: 10
Authentication Requirements, Authentication Functions, Requirements
for Message Authentication Codes (MAC), Security of MACs, MAC
based on Hash Function. Digital signature. User authentication:
Remote user authentication principles, Remote user authentication using
symmetric Encryption, Kerberos, Remote user authentication using
Asymmetric Encryption. Symmetric key distribution using symmetric
and asymmetric encryption. Distribution of public keys.
4. Security at Application Layer and Transport Layer: Application 10
Layer Security: Pretty Good Privacy (PGP), Multipurpose internet Mail
extensions (MIME) and secured Multipurpose internet Mail extensions
(S/MIME). Transport Layer Security: Web security considerations,
Secure socket layer (SSL), Transport Layer security, HTTP
5. Network Security and System security. IP Security: IP Security 10
Overview, IP Security Policy, Encapsulation Security Payload, Wireless
network security: wireless security, Mobile device security. System
security: Buffer overflow and malicious software, Malicious programs,
Intrusion detection systems, Firewalls.

Text Books:
Sl.
Author/s Title Publisher Details
No.
Alfred J. Menezes, Paul Handbook of Applied CRC Press, Reprint 2018.
1. C. van Oorschot and Cryptography
Scott A. Vanstone
2. William Stallings Cryptography and 6thEdition, Pearson
Network Security Education Inc Publishing as
Prentice hall (PHI), 2016.

Reference Books:
Sl.
Author/s Title Publisher Details
No.
1. Behrouz A forouzan, Cryptography and 3rd edition, McGraw Hill
debdeepMukhopadhya Network security education, Revised 2020.
y
2. Charles P. Pfleeger, Security in computing 3rd Edition, Prentice Hall of
Shari Lawrence India, Revised 2016.
Pfleeger
3. Jonathan Katz, Yehuda Introduction to Modern 3rd Edition, CRC press
Lindell Cryptography publications. 2007.
4. AtulKahate Cryptography and 3rd Edition, McGraw Hill
Network Security Education private Limited,
2013.
5. Douglas R. Stinson Cryptography: Theory and 3rd Edition, Chapman and
Practice Hall/CRC, 2006.

17
Web Resources:
Sl.
Web Links
No.
1. https://onlinecourses.nptel.ac.in/noc21_cs16/preview
2. https://onlinecourses.nptel.ac.in/noc21_cs43/preview
3. https://doc.lagout.org/network/3_Cryptography/CRC%20Press%20-%20Handbook
%20of%20applied%20Cryptography.pdf

Course Articulation:
COURSE PROGRAM OUTCOMES
OUTCOMES PO1 PO2 PO3 PO4 PO5 PO6
CO1 - 3 3 3 - -
CO2 3 3 3 3 - -
CO3 3 3 3 3 - -
CO4 3 - 3 3 - -
CO5 3 - 3 3 - -
High – 3, Medium – 2, Low – 1

18

You might also like