0% found this document useful (0 votes)
31 views

Cryptography and Network Security

Uploaded by

vardhansinghh711
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views

Cryptography and Network Security

Uploaded by

vardhansinghh711
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Itgalpur, Rajankunte, Yelahanka, Bengaluru – 560064

Page 1 of 3
Course Code: Course Title: Cryptography and Network Security. 3 0 3
Type of Course: Discipline Elective L- P- C
CSA3027
Version No. 1
Course Pre- Nil
requisites
Anti-requisites Nil
The Course covers the principles and practice of cryptography and network security, focusing in
Course particular on the security aspects of the web and Internet.
Description

Course Objective The objective of the course is to familiarize the learners with the concepts of Cryptography and
Network Security. and attain Employability Skill through Participative Learning techniques.

On successful completion of the course the students shall be able to:

CO1: Identifies the basic concept of Cryptography (Knowledge)


CO2: Express the different types of Cryptographic Algorithms (Comprehension)
Course Out CO3: Recognize the Public key Cryptographic Techniques for various applications.
Comes
(Comprehension)
CO4: Apply the network security concepts during their implementation of network security
application developments. (Application)

Course Content:

Introduction to
Module 1 Cryptography and types of Assignment Data Collection/Interpretation 8 Sessions
Ciphers

Topics: Introduction to Cryptography, Model of Network Security, OSI Security architecture, Security Attacks: active
attacks, passive attacks, services: Authentication, Access Control, Data Confidentiality, Data Integrity, Nonrepudiation,
Substitution Ciphers : Caesar, Mono alphabetic, Polyalphabetic, Play-fair and Hill Cipher, Introduction to Block Cipher
and Stream Cipher, Feistel Structure.
Private Key Cryptography
Case studies /
Module 2 Case studies / Case let 13 Sessions
and Number Theory Case let

Topics: Symmetric Encryption Algorithms : Data Encryption Standard, Introduction to Galois Field, Advanced
Encryption Standard, Modular Arithmetic, Prime numbers, Fermat’s little theorem, brief about primality testing and
factorization, Discrete Logarithmic Problem, Euclidean and Extended Euclidean Algorithm, Euler Totient Function,
Chinese Remainder Theorem.

Public Key Cryptography


Module 3 Quiz Case studies / Case let 14 Sessions
and its Applications

Topics: Overview of Public Key Cryptography, RSA, Diffie - Helman Key exchange, Man in the middle attack,
Cryptographic Hash functions, Secure Hash Algorithm, Message Authentication Codes – HMAC, Digital Signature,
Discussion on real time practices of Cryptography.

Module 4 Network Security Quiz Case studies / Case let 14 Sessions

Topics: Network Security fundamentals, Network Security applications: Authentication: Kerberos, PKI, Network
Security applications: e-mail security y: PGP, MIME, Network Security applications: IP Security: IP Sec architecture,
Network Security applications: Web Security.

Targeted Application & Tools that can be used: Kali Linux

Project work/Assignment:
Project: Malware detections, IDS and IPS for IOT devices using wire shark, NMAP etc.
Assignment: Review on types of attacks in networks, Article review, quiz, written assignments Page 2 of 3
Page 3 of 3

You might also like