0% found this document useful (1 vote)
1K views2 pages

Cryptography & Network Security

This 3 credit course covers fundamental aspects of cryptography and network security, including common attacks, authentication, access control, and security policies. The course contents include foundations of security and cryptography, block ciphers, public key cryptography, digital signatures, and system security. Evaluation includes 3 tests, assignments, tutorials, quizzes and attendance, for a total of 100 marks.

Uploaded by

rishabhdubey
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
1K views2 pages

Cryptography & Network Security

This 3 credit course covers fundamental aspects of cryptography and network security, including common attacks, authentication, access control, and security policies. The course contents include foundations of security and cryptography, block ciphers, public key cryptography, digital signatures, and system security. Evaluation includes 3 tests, assignments, tutorials, quizzes and attendance, for a total of 100 marks.

Uploaded by

rishabhdubey
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

Course Description

Title of Course: Cryptography and Network Security


Course Code: 10B25CI853
L-T Scheme: 3-0 Course Credit: 3

Objectives
The course covers fundamental aspects of security in a modern networked environment
with the focus on system design aspects and cryptography in the specific context of
network / internetwork security. It also dwells into basics of cryptographic techniques,
algorithms and protocols required to achieve these properties; computational issues in
implementing cryptographic protocols and algorithms; and system/application design
issues in building secure networked systems.

Learning Outcomes
After completing this course, students will be able to explain common attacks against
network assets, the associated threats and vulnerabilities, and what network security
personnel do to secure assets. They would be able to protect information in an
organization by using authentication and access control. They would be able to identify
types of security policies to manage operational security, and then use these policies to
ensure compliance by users in an organization.

Course Contents
Foundation of Security & Cryptography: OSI security architecture, Classical encryption
techniques. Mathematical Tools for Cryptography: Finite fields, number theory. Block
Ciphers: Design principles, Data encryption standard, advanced encryption standard,
multiple encryption and Triple DES, Block cipher modes of operation.

Public Key Cryptography: RSA, Key management, Diffie-Hellman key exchange,


Elliptic curve Arithmetic, Elliptic curve cryptography. Message authentication and Hash
functions. Hash and MAC algorithms: Secure hash algorithm, HMAC.

Digital Signature, Certificates & Standards. Authentication Applications: Kerberos,


X.509 authentication service. Electronic Mail Security: PGP, S/MIME. IP Security
Protocols.

System Security: Computer virus, Firewall & Intrusion detection, trusted systems,
Security investigation.

Teaching Methodology
Lectures would be interactive and it would cover the core concepts that are explained in
the text and reference materials with adequate examples. Tutorials will have conceptual
and numerical questions that would aid in strengthening the cryptographic principles.
Evaluation Scheme
Test – 1 : 15 marks
Test – 2 : 25 marks
Test – 3 : 35 marks
Assignments : 5 marks
Tutorial/Problem Solving : 10 marks
Quizzes : 5 marks
Attendance : 5 marks
Total : 100 marks

Text Books
1. William Stallings: Cryptography and Network Security. 4th Edition. Prentice-Hall,
Englewood Cliffs, 2006.

Reference Books
1. Bruce Schneider: Applied Cryptography, Wiley Student Edition, 2nd Edition,
Singapore, 1996.
2. C.Kauffman, R.Perlman and M.Spenser: Network Security, Second Edition, Prentice
Hall, Englewood Cliffs, 2002.
3. S.Bellovin and W.Chesvick: Internet Security and Firewalls, Second Edition, Addison-
Wesley, Reading, 1998.

You might also like