0% found this document useful (0 votes)
65 views4 pages

CSE 032 Syllabus

This document provides information about the Cryptography and Network Security course offered as part of the B.Tech program in the Computer Science and Engineering department. The 3 credit course aims to provide an introduction to basic concepts and algorithms of symmetric and asymmetric cryptography. It covers topics like classical encryption techniques, block ciphers, public key cryptography, digital signatures, and security at various layers of the network. Students will learn to identify cryptography concepts, apply mathematical algorithms, explain security analysis tools, and compare various network security algorithms. Course assessment includes class assignments, mid-term exams, and end-term exams.

Uploaded by

asdadsa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views4 pages

CSE 032 Syllabus

This document provides information about the Cryptography and Network Security course offered as part of the B.Tech program in the Computer Science and Engineering department. The 3 credit course aims to provide an introduction to basic concepts and algorithms of symmetric and asymmetric cryptography. It covers topics like classical encryption techniques, block ciphers, public key cryptography, digital signatures, and security at various layers of the network. Students will learn to identify cryptography concepts, apply mathematical algorithms, explain security analysis tools, and compare various network security algorithms. Course assessment includes class assignments, mid-term exams, and end-term exams.

Uploaded by

asdadsa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

School: School of Engineering and technology

Department Department of Computer Science and Engineering


Program: B. Tech

Branch:

1 Course Code CSE032

2 Course Title Cryptography and Network Security

3 Credits 3

4 Contact 3-0-0
Hours

(L-T-P)

Course Core
Status

5 Course The objective of this course is to provide an intention to explain basic


Objective concepts and algorithms of symmetric &asymmetric key cryptography,
including encryption/decryption and key exchange with the application
of cryptography and technique.
6 Course On successful completion of this module students will be able to:
Outcomes
CO1: Identify the basic concepts of computer security, algorithms of
symmetric Key cryptography, including encryption/decryption.
CO2: Apply the tools and methodologies used to perform mathematic
concepts behind the cryptographic algorithms..

CO3: Explain the tools and methodologies used to perform Security


analysis.

CO4: Interpret use of cryptographic data integrity algorithms and user


authentication protocols
CO5: Examine security at application layer, transport layer and network
layer.
CO6: Compare various algorithm of cryptography used for Network
Security.
7 Course This course will provide a deterministic approach of both the principles
Description and practice of cryptography & network security. It covers the basic
issues to be addressed by a network security capability, and explored by
providing a tutorial and survey of cryptography and network security
technology.

8 Outline syllabus CO
Mapping

Unit 1 Introduction& symmetric Key Cryptography

A Computer Security Concepts- OSI security Architecture, Security CO1


attacks, Services, mechanism, model of network security
B Classical encryption techniques- Substitution Cipher(Mono- CO1
alphabetic, Poly-alphabetic), Transposition cipher, Stegnography
C Block Cipher- Encryption Principles, DES and its variants, strength CO1
of DES
Unit 2 Mathematics of Cryptography

A Eucledian, Extended Eucledian Algorithm, EuilersTotient Function CO2


, Ferment little Theorem, Eulers theorem
B Primality Testing-Miller Rabin test, Chinese Remainder Theorem CO2, CO6

C Exponential- square and multiply method, Discrete Logarithm CO2, CO6

Unit 3 Asymmetric Cryptography & Key Exchange

A Public Key cryptography-RSA, Cryptanalysis of RSA CO3

B Elgamal cryptography, Elliptic Curve cryptography CO3, CO6

C Key Management and distribution : KDC, Diffie Hellman Key CO3, CO6
Exchange
Unit 4 Digital signatures

A User Authentication protocol- Kerberos CO4

B Digital Signature –RSA, Elgamal, DSS CO4

C Data integrity algorithms-Hash Functions, MD5, SHA-512 CO4

Unit 5 Security

A Security at Application layer-Email Architecture, S/MIME, PGP- CO5


Scenarios, key rings
B Security at Transport layer-SSL( Services, Protocols) CO5

C Security at Network layer-IPSec(Modes, Security Protocols-AH, CO6


ESP, Services provided by IPSEC)
Mode of Theory/Jury/Practical/Viva
examination

Weightage CA MTE ETE


Distribution 30% 20% 50%

Text book/s* 1. Atul Kahate , "Network Security ", Wiley India Pvt Ltd, 2010.
2. Michael T. Simpson, "Hands-on Cryptography & Network
Security & Network Defense", Course Technology, 2010.
3. Rajat Khare, "Network Seuciryt and Cryptography & Network
Security ", Luniver Press, 2006.

Other 1. Bruce Schneier, “Applied Cryptography”, John Wiley & Sons


Inc, 2001.
References 2. Behrouz A. Forouzan, “Cryptography And Network Security”-
McGraw Hill
1. Internet as a resource for reference.

CO and PO Mapping

S. Course Outcome Program Outcomes (PO) & Program


No. Specific Outcomes (PSO)
1. CO1: Identifybasic concepts of computer security, algorithms PO1, PO2, PSO1. PSO2
of symmetric Key cryptography, including
encryption/decryption.
2. CO2: Apply the tools and methodologies used to perform PO1,PO2,PO3, PO4, PSO1,PSO2
mathematic concepts behind the cryptographic algorithms..

3. CO3: Explain the tools and methodologies used to perform PO1, PO3, PO5, PSO1, PSO2
Security analysis.

4. CO4: Analyze and use cryptographic data integrity PO1, PO4, PO6, PO7, PSO1,PSO2
algorithms and user authentication protocols
5. CO5. Examine security at application layer, transport layer PO5,PO7, PO8, PO9, PSO1,PSO2
and network layer.

6. CO6: Compare various algorithm of cryptography used for PO10,PO11,PO12,PSO1,PSO3


Network Security.

PO and PSO mapping with level of strength for Course Name Cryptography and Network
Security (Course Code CSE032)

Code_ CO’ P PO2 P PO P P P P PO PO10 PO11 PO12 PSO PSO PSO3


Course s O O 4 O O O7 O 9 1 2
Name 1 3 5 6 8

-
CO1 3 2 - - - - - - - - 3 1 -
CSE03
2_Cryp
tograph CO2 2 3 2 1 - - - - - - - - 2 3 -
y and
Networ CO3 2 - 2 - 3 - - - - - - - 2 2 1
k 2
Securit CO4 2 - - 2 - 2 2 - - - - - 2
y CO5 - - - - 2 - 2 2 2 - - 1 - -

CO6 - - - - - - - - - 2 2 2 2 - 2

Average of non-zeros entry in following table (should be auto calculated).


P P P P PS PS
PO PO PO PO PO PS
Course Code Course Name PO1 PO2 PO 3 O O O O1 O O
4 5 8 9 10 O1
6 7 11 2 2 3
Cryptography
and Network
CSE032 Security y and 2.5 2.5 2 1.5 2.5 2 2 2 2 2 2 2 2 2 1.5

Network Security

Strength of Correlation

1. Addressed toSlight (Low=1) extent 2. Addressed toModerate (Medium=2) extent

3. Addressed toSubstantial (High=3) extent

You might also like