0% found this document useful (0 votes)
35 views

(Cs 021/tit 701) Cryptography and Network Security

This document outlines the units of a cryptography and network security course. Unit I introduces security attacks and mechanisms, as well as conventional encryption techniques like substitution and transposition ciphers. Unit II covers the mathematical foundations for public key cryptography including prime numbers, modular arithmetic, and discrete logarithms. Unit III discusses message authentication codes, hash functions, and digital signatures. Unit IV presents authentication applications such as Kerberos and digital signature standards. Unit V covers IP security, web security including SSL/TLS, and system security threats like firewalls and viruses.

Uploaded by

Alok Raj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views

(Cs 021/tit 701) Cryptography and Network Security

This document outlines the units of a cryptography and network security course. Unit I introduces security attacks and mechanisms, as well as conventional encryption techniques like substitution and transposition ciphers. Unit II covers the mathematical foundations for public key cryptography including prime numbers, modular arithmetic, and discrete logarithms. Unit III discusses message authentication codes, hash functions, and digital signatures. Unit IV presents authentication applications such as Kerberos and digital signature standards. Unit V covers IP security, web security including SSL/TLS, and system security threats like firewalls and viruses.

Uploaded by

Alok Raj
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

(CS 021/TIT 701 ) CRYPTOGRAPHY AND NETWORK SECURITY

Unit-I

Introduction to security attacks, services and mechanism, introduction to cryptography. Conventional Encryption:
Conventional encryption model, classical encryption techniques- substitution ciphers and transposition ciphers,
cryptanalysis, stereography, stream and block ciphers. Modern Block Ciphers: Block ciphers principals, Shannon’s
theory of confusion and diffusion, fiestal structure, data encryption standard(DES), strength of DES, differential and
linear crypt analysis of DES, block cipher modes of operations, triple DES, IDEA encryption and decryption, strength
of IDEA, confidentiality using conventional encryption, traffic confidentiality, key distribution, random number
generation.

Unit-II

Introduction to graph, ring and field, prime and relative prime numbers, modular arithmetic, Fermat’s and Euler’s
theorem, primality testing, Euclid’s Algorithm, Chinese Remainder theorem, discrete logarithms. Principals of public
key crypto systems, RSA algorithm, security of RSA, key management, Diffle-Hellman key exchange algorithm,
introductory idea of Elliptic curve cryptography, Elganel encryption.

Unit-III

Message Authentication and Hash Function: Authentication requirements, authentication functions, message
authentication code, hash functions, birthday attacks, security of hash functions and MACS, MD5 message digest
algorithm, Secure hash algorithm(SHA).

Digital Signatures: Digital Signatures, authentication protocols, digital signature standards (DSS), proof of digital
signature algorithm.

Unit-IV

Authentication Applications: Kerberos and X.509, directory authentication service, electronic mail security-pretty
good privacy (PGP), S/MIME.

Unit-V

IP Security: Architecture, Authentication header, Encapsulating security payloads, combining security associations,
key management.

Web Security: Secure socket layer and transport layer security, secure electronic transaction (SET).

System Security: Intruders, Viruses and related threads, firewall design principals, trusted systems.

You might also like