0% found this document useful (0 votes)
117 views

Cryptography and Network Security

This course aims to provide students with an understanding of information security fundamentals including cryptography and its application to network security. Over the course of 5 units spanning 30 hours, students will learn about risks to computer systems and networks, cryptography algorithms, message authentication, authentication applications, and security in networks. Key topics include symmetric and asymmetric encryption techniques, hash functions, digital signatures, firewalls, and protocols like SSL, TLS, and SET. The goal is for students to understand standard security mechanisms and be able to develop their own security solutions to protect systems and networks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
117 views

Cryptography and Network Security

This course aims to provide students with an understanding of information security fundamentals including cryptography and its application to network security. Over the course of 5 units spanning 30 hours, students will learn about risks to computer systems and networks, cryptography algorithms, message authentication, authentication applications, and security in networks. Key topics include symmetric and asymmetric encryption techniques, hash functions, digital signatures, firewalls, and protocols like SSL, TLS, and SET. The goal is for students to understand standard security mechanisms and be able to develop their own security solutions to protect systems and networks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Cryptography and Network Security

COURSE OBJECTIVES
This course aims to give an outline of information security. The course will equip students with a
vibrant view of the existing information security landscape including fundamentals of
cryptography and its application to network security.
COURSE OUTCOME
The student would be able to:
CO1: Understand and explain the risks faced by computer systems and networks.
CO2: Use cryptography algorithms and protocols to achieve computer security.
CO3: Explain how standard security mechanisms work.
CO4: Develop security mechanisms to protect computer systems and networks
CO5: Acquire background on hash functions; authentication; firewalls; intrusion detection
techniques
OUTLINE OF THE Title of Unit Time Required for Unit
COURSE Unit No (Hours)
1 Introduction to 5
Information Security
2 Conventional 6
Cryptographic
Techniques
3 Message Authentication 6
4 Authentication 6
Application
5 Security in Networks 7

Detailed Syllabus
Unit 1: Introduction to Information Security (5L)
Introduction to Information Security: Attacks, Vulnerability, Security Goals, Security Services
and mechanisms. introduction to cryptography -Conventional Encryption: Conventional
encryption model, classical encryption techniques- substitution ciphers and transposition ciphers,
cryptanalysis, stereography, stream and block ciphers.
Unit 2: Conventional Cryptographic Techniques (6L)
Shannon’s theory of confusion and diffusion, Symmetric and Asymmetric Cryptographic
Techniques: DES, AES, RSA algorithms. triple DES, IDEA encryption and decryption, strength
of IDEA, confidentiality using conventional encryption, traffic confidentiality, key distribution,
random number generation.
Unit 3: Message Authentication and Hash Function (6L)
Authentication requirements, authentication functions, message authentication code, hash
functions, birthday attacks, security of hash functions and MACS, MD5 message digest
algorithm, Secure hash algorithm (SHA). Digital Signatures: Digital Signatures, authentication
protocols, digital signature standards (DSS), proof of digital signature algorithm
Unit 4: Authentication Applications (6L)
Use of Cryptography for authentication, Secure Hash function, Key management - Kerberos and
X.509, directory authentication service, electronic mail security-pretty good privacy (PGP),
S/MIME.
Unit 5: Security in Networks (7L)
Network Security Controls – Architecture, Encryption, Content Integrity, Strong Authentication,
Access Controls, Firewalls – Design and Types of Firewalls, Personal Firewalls, IDS, Email
Security – PGPS/MIME.
Web Security: Secure socket layer and transport layer security, secure electronic transaction
(SET).
System Security: Intruders, Viruses and related threads, firewall design principals, trusted
systems
Text/Reference Books:
1. Charles P. Pfleeger, “Security in Computing”, Fourth Edition, Pearson Education
2. William Stallings, “Cryptography And Network Security Principles And Practice”, Fifth
Edition, , Pearson
3. Wenbo Mao, “Modern Cryptography: Theory and Practice”, Prentice Hall.
4. William Stallings, “Network Security Essentials: Applications and Standards” Prentice Hall.

You might also like