0% found this document useful (0 votes)
337 views

Cryptography and Network Security

The document outlines a course on Cryptography and Network Security that is offered in Semester III/IV. The course is worth 15 total hours and covers topics such as classical encryption techniques, block ciphers, asymmetric key cryptography, cryptographic hash functions, digital signatures, IP security, and intrusion detection systems. The course aims to explain various encryption methods and teach students how to apply cryptographic techniques and analyze network security threats.
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
337 views

Cryptography and Network Security

The document outlines a course on Cryptography and Network Security that is offered in Semester III/IV. The course is worth 15 total hours and covers topics such as classical encryption techniques, block ciphers, asymmetric key cryptography, cryptographic hash functions, digital signatures, IP security, and intrusion detection systems. The course aims to explain various encryption methods and teach students how to apply cryptographic techniques and analyze network security threats.
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 4

Regulation 2018 Semester III / IV Total Hours 15

Course Hours / Week


Category Course Name C
Code L T P
C 18AIC307T Cryptography and Network Security 3 0 0 3

Prerequisite Course (s)


Computer Networks
Course Objective (s):
The purpose of learning this course is to:
To understand the difference between stream ciphers & block ciphers, present an
CLR-1: overview of the Festal Cipher and explain the encryption and decryption, present an
overview of DES,. Triple DES, Blowfish, IDEA

CLR-2: Presents the basic principles of public key cryptography, distinct uses of public key
cryptosystems.

CLR-3: Know the overview of the basic structure of cryptographic functions, Message
Authentication Codes, Understand the operation of SHA-512, HMAC, Digital Signature
To learn an overview of techniques for remote user authentication, Kerberos, Summarize
CLR-4: Web Security threats and Web traffic security approaches, overview of SSL & TLS.
Present an overview of electronic mail security
CLR-5: Provide an overview of IP Security, concept of security association, Intrusion Detection
Techniques
Course Outcome (s) (Cos):
At the end of this course, learners will be able to:
CO1 Explain various classical encryption techniques.
CO2 Understand block ciphers and write Symmetric key cryptographic algorithms.
Apply Cryptographic Hash Functions & and verify messages using well known signature
CO3
generation and verification algorithms.
CO4 Discuss User Authentication, Transport Layer Security & Email Security
CO5 Describe IP Security & Intrusion Detection Systems
CO-PO Mapping
POs PSOs
COs PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1
2
CO1 3 - - - - - - 2 - - - 2 - -

CO2 3 2 3 - - - - 2 - - - 2 3 -

CO3 3 2 - - - - - 1 - - - 2 3 -

CO4 2 - - - - - - 3 - - - 2 - -

CO5 2 - - - - - - 2 - - - 2 - -

B.Tech - Artificial Intelligence and Data Science Curriculum and Syllabus | 2018 1
Regulation
CO
2.6 2 3 0 0 0 0 5 0 0 0 2 3 0
(Avg)

1: Slight (Low) 2: Moderate (Medium) 3: Substantial (High)

B.Tech - Artificial Intelligence and Data Science Curriculum and Syllabus | 2018 2
Regulation
UNIT I Classical Encryption Techniques 2
Introduction: Security attacks, services & mechanisms, Symmetric Cipher Model, Substitution
Techniques, Transportation Techniques, Cyber threats and their defense( Phishing Defensive
measures, web based attacks, SQL injection & Defense techniques), Buffer overflow & format
string vulnerabilities, TCP session hijacking(ARP attacks, route table modification) UDP hijacking
( man-in-the-middle attacks).
UNIT II Block Ciphers & Symmetric Key Cryptography 4
Traditional Block Cipher Structure, DES, Block Cipher Design Principles, AES-Structure,
Transformation functions, Key Expansion, Blowfish, CAST-128, IDEA, Block Cipher Modes of
Operations
UNIT III Number Theory & Asymmetric Key Cryptography 4
Number Theory: Prime and Relatively Prime Numbers, Modular Arithmetic, Fermat’s and Euler’s
Theorems, The Chinese Remainder theorem, Discrete logarithms.
Public Key Cryptography: Principles, public key cryptography algorithms, RSA Algorithms, Diffie
Hellman Key Exchange, Elgamal encryption & decryption, Elliptic Curve Cryptography.

UNIT IV Cryptographic Hash Functions & Digital Signatures 2


Application of Cryptographic hash Functions, Requirements & Security, Secure Hash Algorithm,
Message Authentication Functions, Requirements & Security, HMAC & CMAC. Digital
Signatures, NIST Digital Signature Algorithm. Key management & distribution.
UNIT V IP Security & Intrusion Detection Systems 3
IP Security: IP Security Overview, IP Security Architecture, Authentication Header, Encapsulating
Security Payload, Combining Security Associations and Key Management.
Intrusion detection: Overview, Approaches for IDS/IPS, Signature based IDS, Host based IDS/IPS.
Reference (s)
1 Everyday Cryptography, Fundamental Principles & Applications, Keith Martin, Oxford
2 Network Security & Cryptography, Bernard Menezes, Cengage,2010
Text Books

1 Cryptography & Network Security: Principles and Practices, William Stallings, PEA, Sixth
edition.
Introduction to Computer Networks & Cyber Security, Chwan Hwa Wu, J.David Irwin,
2
CRC press
3 Hack Proofing your Network, Russell, Kaminsky, Forest Puppy, Wiley Dreamtech.
Web References
1 https://www.geeksforgeeks.org/cryptography-and-its-types/
2 https://nptel.ac.in/courses/106105031

B.Tech - Artificial Intelligence and Data Science Curriculum and Syllabus | 2018 3
Regulation
B.Tech - Artificial Intelligence and Data Science Curriculum and Syllabus | 2018 4
Regulation

You might also like