22SCE151Cryptography and Network Security
22SCE151Cryptography and Network Security
22SCE151Cryptography and Network Security
T
Course Code 22SCE15 Total 4 Course Type Professional Elective Course
1 Credits
CourseTitle Cryptography and Network Security
Contact Credits Assessment in
Teaching Hours Weightage and marks
Learning Lecture 52 4 CIE SEE Total
Process
Tutorial 0 0 Weightage 40 % 60 % 100 %
Practical 0 0 Maximu 40 60 Marks 100
m Marks Marks Marks
Total 52 4 Minimum 20 25 marks 45 Marks
Marks marks
Note: *For passing the student has to score a minimum of 45 Marks (CIE+SEE: 20 + 25 or 21 + 24)
16
Algorithm, Diffie-Hellman Key Exchange, Elliptic curve cryptography.
Cryptographic Hash Functions: Applications of Cryptographic Hash
Functions, Two simple hash functions, Secure Hash Algorithm (SHA).
3. Authentication and Key Management: Message Authentication: 10
Authentication Requirements, Authentication Functions, Requirements
for Message Authentication Codes (MAC), Security of MACs, MAC
based on Hash Function. Digital signature. User authentication:
Remote user authentication principles, Remote user authentication using
symmetric Encryption, Kerberos, Remote user authentication using
Asymmetric Encryption. Symmetric key distribution using symmetric
and asymmetric encryption. Distribution of public keys.
4. Security at Application Layer and Transport Layer: Application 10
Layer Security: Pretty Good Privacy (PGP), Multipurpose internet Mail
extensions (MIME) and secured Multipurpose internet Mail extensions
(S/MIME). Transport Layer Security: Web security considerations,
Secure socket layer (SSL), Transport Layer security, HTTP
5. Network Security and System security. IP Security: IP Security 10
Overview, IP Security Policy, Encapsulation Security Payload, Wireless
network security: wireless security, Mobile device security. System
security: Buffer overflow and malicious software, Malicious programs,
Intrusion detection systems, Firewalls.
Text Books:
Sl.
Author/s Title Publisher Details
No.
Alfred J. Menezes, Paul Handbook of Applied CRC Press, Reprint 2018.
1. C. van Oorschot and Cryptography
Scott A. Vanstone
2. William Stallings Cryptography and 6thEdition, Pearson
Network Security Education Inc Publishing as
Prentice hall (PHI), 2016.
Reference Books:
Sl.
Author/s Title Publisher Details
No.
1. Behrouz A forouzan, Cryptography and 3rd edition, McGraw Hill
debdeepMukhopadhya Network security education, Revised 2020.
y
2. Charles P. Pfleeger, Security in computing 3rd Edition, Prentice Hall of
Shari Lawrence India, Revised 2016.
Pfleeger
3. Jonathan Katz, Yehuda Introduction to Modern 3rd Edition, CRC press
Lindell Cryptography publications. 2007.
4. AtulKahate Cryptography and 3rd Edition, McGraw Hill
Network Security Education private Limited,
2013.
5. Douglas R. Stinson Cryptography: Theory and 3rd Edition, Chapman and
Practice Hall/CRC, 2006.
17
Web Resources:
Sl.
Web Links
No.
1. https://onlinecourses.nptel.ac.in/noc21_cs16/preview
2. https://onlinecourses.nptel.ac.in/noc21_cs43/preview
3. https://doc.lagout.org/network/3_Cryptography/CRC%20Press%20-%20Handbook
%20of%20applied%20Cryptography.pdf
Course Articulation:
COURSE PROGRAM OUTCOMES
OUTCOMES PO1 PO2 PO3 PO4 PO5 PO6
CO1 - 3 3 3 - -
CO2 3 3 3 3 - -
CO3 3 3 3 3 - -
CO4 3 - 3 3 - -
CO5 3 - 3 3 - -
High – 3, Medium – 2, Low – 1
18