0% found this document useful (0 votes)
65 views

Cryptography Course Information Sheet

This course information sheet provides details about the Cryptography and Network Security course offered in the Information Technology program. The course is offered in the first semester and carries 3 credits. It is a core course that covers topics like introduction to security attacks and mechanisms, symmetric and asymmetric cryptography, cryptographic hash functions, authentication applications, IP security, and system security. The course aims to explain security objectives, analyze security tradeoffs, discuss threats to computers and networks, and help students design security solutions for applications. Assessment will include assignments, seminars, tests, and a final examination. Beyond the syllabus, advanced topics, assignments, industry visits, and guest lectures are also proposed.

Uploaded by

ph2in3856
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views

Cryptography Course Information Sheet

This course information sheet provides details about the Cryptography and Network Security course offered in the Information Technology program. The course is offered in the first semester and carries 3 credits. It is a core course that covers topics like introduction to security attacks and mechanisms, symmetric and asymmetric cryptography, cryptographic hash functions, authentication applications, IP security, and system security. The course aims to explain security objectives, analyze security tradeoffs, discuss threats to computers and networks, and help students design security solutions for applications. Assessment will include assignments, seminars, tests, and a final examination. Beyond the syllabus, advanced topics, assignments, industry visits, and guest lectures are also proposed.

Uploaded by

ph2in3856
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

COURSE INFORMATION SHEET

PROGRAMME: Information Technology DEGREE: BTECH


COURSE: Crytograhy an! "et#or$ Sec%rity SEMESTER:I CREDITS: &
COURSE CODE: R&'()' REGU*ATIO":R'( COURSE T+PE: Core ,Electi-e , Brea!th, S.H
COURSE AREA,DOMAI": Com%ter "et#or$/ CO"TACT HOURS: &0' 1T%torial2 ho%r/,3ee$4
SYLLABUS:
U"IT DETAI*S HOURS
I
Intro!%ction: Sec%rity Attac$/5 Sec%rity Ser-ice/5 Sec%rity Mechani/m/5 an! a Mo!el for "et#or$
Sec%rity5 "on6Crytograhic Protocol 7%lnera8ilitie/6DoS5 DDoS5 Se//ion Hi9ac$ing an! Soofing5
Soft#are 7%lnera8ilitie/6 Phi/hing5 B%ffer O-erflo#5 :ormat String Attac$/5 S;* In9ection5 Ba/ic/ of
Crytograhy < Symmetric Ciher Mo!el5 S%8/tit%tion Techni=%e/5 Tran/ortation Techni=%e/5 Other
Ciher Proertie/6 Conf%/ion5 Diff%/ion5 Bloc$ an! Stream Ciher/4
'>
II
Secret ?ey Crytograhy: Data Encrytion Stan!ar!1DES25 Strength of DES5 Bloc$ Ciher De/ign
Princile/ an! Mo!e/ of Oeration/5 Trile DES5 International Data Encrytion algorithm5 Blo#fi/h5
CAST6'>@5AES
''
III
"%m8er Theory: Prime an! Relati-ely Prime "%m8er/5 Mo!%lar Arithmetic5 :ermatA/ an! E%lerA/
Theorem/5 the Chine/e Remain!er Theorem5 Di/crete *ogarithm/4
B
I7
P%8lic ?ey Crytograhy: Princile/ of P%8lic ?ey Cryto/y/tem/5 RSA Algorithm5 Diffie6Hellman
?ey ECchange5 Intro!%ction to Ellitic C%r-e Crytograhy4
D
7
Crytograhic Ha/h :%nction/: Alication/ of Crytograhic Ha/h :%nction/5 Sec%re Ha/h Algorithm5
Me//age A%thentication Co!e/ < Me//age A%thentication Re=%irement/ an! :%nction/5 HMAC5 Digital
/ignat%re/5 Digital Signat%re Scheme/5 A%thentication Protocol/5 Digital Signat%re Stan!ar!/4
'(
7I
A%thentication Alication/: ?er8ero/5 ?ey Management an! Di/tri8%tion5 E4)(B Directory
A%thentication /er-ice5 P%8lic ?ey Infra/tr%ct%re5 Electronic Mail Sec%rity: Pretty Goo! Pri-acy5
S,MIME4
'>
7II
IP Sec%rity: O-er-ie#5 Architect%re5 A%thentication Hea!er5 Enca/%lating Sec%rity Payloa!5 Com8ining
/ec%rity A//ociation/5 Internet ?ey ECchange5 3e8 Sec%rity: 3e8 Sec%rity Con/i!eration/5 Sec%re
Soc$et/ *ayer an! Tran/ort *ayer Sec%rity5 Electronic Payment4
''
7III
Sy/tem Sec%rity: Intr%!er/5 Intr%/ion Detection5 Pa//#or! Management5 Malicio%/ Soft#are <Tye/5
7ir%/e/5 7ir%/ Co%ntermea/%re/5 3orm/5 :ire#all/6 Characteri/tic/5 Tye/ of :ire#all/5 Placement of
:ire#all/5 :ire#all Config%ration5 Tr%/te! /y/tem/4
'(
TOTA* HOURS
@>
TEXT/REFERENCE BOOKS:
T,R BOO? TIT*E,AUTHORS,PUB*ICATIO"
T'
Crytograhy an! "et#or$ Sec%rity: Princile/ an! Practice )th e!ition5 3illiam Stalling/5 Pear/on E! >(''
T>
"et#or$ Sec%rity an! Crytograhy >n! e!ition5 Bernar! MeneFe/5 Cengage *earning >(''
TG
Crytograhy an! "et#or$5 >n! e!ition5 Behro%F A :o%ro%Fan5 De8!ee M%$hoa!hyay5 TMH >('(
T&
Crytograhy an! "et#or$ Sec%rity: Princile/ an! Practice &th e!ition5 3illiam Stalling/5 Pear/on E!
R'
:%n!amental/ of "et#or$ Sec%rity5 Eric Mai#al! 1 Dreamtech re//2
R>
Princile/ of Information Sec%rity5 3hitman5 Thom/on4
RG
Intro!%ction to Crytograhy5 B%chmann5 Sringer
R&
Alie! Crytograhy5 >n! E!ition5 Br%ce Schneier5 Hohn#iley./on/
COURSE PRE-REQUISITES:
C4CODE COURSE "AME DESCRIPTIO" SEM
Computer Netor!" B#"$% Re&ere'%e mo(e)" *+,
R,-,-. C Pro/r#mm$'/ B#"$% Pro/r#mm$'/ Stru%ture" #'( 0#t# t1pe" ,+,
0#t# Stru%ture" Se#r%2$'/ #'( "ort$'/ te%2'$3ue" 4+,
COURSE OB5ECTI6ES:
' EClain the o89ecti-e/ of information /ec%rity
> AnalyFe the tra!eoff/ inherent in /ec%rity
G EClain the imortance an! alication of each of confi!entiality5 integrity5 an! a-aila8ility
& Un!er/tan! the 8a/ic categorie/ of threat/ to com%ter/ an! net#or$/
) Di/c%// i//%e/ for creating /ec%rity olicy for a large organiFation
COURSE OUTCOMES:
S"O DESCRIPTIO" PO
MAPPI"G
'
De/ign a /ec%rity /ol%tion for a gi-en alication4
>
Un!er/tan!/ !ifferent crytograhic algorithm imlementation !etail/
G
AnalyFe a gi-en /y/tem #ith re/ect to /ec%rity of the /y/tem4
7APES IN THE SYLLABUS - TO MEET IN0USTRY/PROFESSION REQUIREMENTS:
S"O DESCRIPTIO" PROPOSED
ACTIO"S
'
7oice an! 7i!eo Crytograhy in a DSP En-ironment
>
The Politic/ of ISoft#are Patent/I
G
Tran/arent Data Encrytion: "e# Technologie/ an! Be/t Practice/ for Data8a/e Encrytion
PROPOSED ACTIO"S: TOPICS BE+O"D S+**ABUS,ASSIG"ME"T,I"DUSTR+ 7ISIT,GUEST *ECTURER,"PTE* ETC
TOPICS BEYON0 SYLLABUS/A06ANCE0 TOPICS/0ESI7N:
8EB SOURCE REFERENCES:
3' htt:,,###4c/4ioc4ee,yi$,/chool/,#in>((&,naor6/li!e/>4)4t
3> htt:,,###4c/4%m!4e!%,J9$atF,gra!cryto>,"OTES,lect%re>4!f
3G htt:,,###4in$a/4net,teaching,ac,>((K,lect%re/,lect%reD4!f
3& htt:,,###4c/4f/%4e!%,J8reno,CIS6KBG(,lect%reL/li!e/,cla//('4!f
3) htt:,,ntel4iitm4ac4in,co%r/e/,'(K'()(G',
0ELI6ERY/INSTRUCTIONAL METHO0OLO7IES:
CHA*? . TA*? STUD4 ASSIG"ME"T 3EB RESOURCES
ASSESSMENT METHO0OLO7IES-0IRECT
ASSIG"ME"TS STUD4 SEMI"ARS TESTS,MODE* EEAMS U"I74 EEAMI"ATIO"
ASSESSMENT METHO0OLO7IES-IN0IRECT
ASSESSME"T O: COURSE OUTCOMES 1B+ :EEDBAC?5 O"CE2 STUDE"T :EEDBAC? O" :ACU*T+ 1T3ICE2
He#( o& t2e 0ep#rtme't
9P+RAMBABU:

You might also like