0% found this document useful (0 votes)
23 views2 pages

cryptography syllabus

The document outlines the course structure for 'Cryptography and Cyber Security' at Vivekanandha College of Engineering for Women, detailing objectives, outcomes, and assessment methods. It covers key topics such as symmetric and asymmetric cryptography, web security, and security testing for web applications. The syllabus includes various units that address both theoretical concepts and practical applications in the field of network security.

Uploaded by

nirmalaece
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views2 pages

cryptography syllabus

The document outlines the course structure for 'Cryptography and Cyber Security' at Vivekanandha College of Engineering for Women, detailing objectives, outcomes, and assessment methods. It covers key topics such as symmetric and asymmetric cryptography, web security, and security testing for web applications. The syllabus includes various units that address both theoretical concepts and practical applications in the field of network security.

Uploaded by

nirmalaece
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

VIVEKANANDHA COLLEGE OF ENGINEERING FOR WOMEN

(Autonomous Institution, Affiliated to Anna University ,Chennai)


Elayampalayam, Tiruchengode – 637 205
Programme B.E. Programme Code 103 Regulation
ELECTRONICS AND COMMUNICATION
Department Semester
ENGINEERING
Periods Per Week Credit Maximum Marks
Course Code Course Name
L T P C CA ESE Total
U19ECV53 Cryptography and Cyber 3 0 0 3 40 60 100
Security
 Study the Cryptography Theories, Algorithms and Systems.
 Understand necessary Approaches and Techniques to build protection
Course mechanisms in order to secure computer networks.
Objective Implement machine learning techniques WEB Security & Os Security
 Learn the Security Testing For Web Applications
Knowledge
At the end of the course, the student should be able to,
Level
CO1: Understand the fundamentals of networks security, security architecture,
K2
threats and vulnerabilities
Course CO2: Apply the different cryptographic operations of symmetric cryptographic
K3
Outcomes algorithms
CO3: Apply the different cryptographic operations of public key cryptography K3
CO4: apply the machine learning techniques WEB Security & Os Security K3
CO5: Write software/project implementations of learning algorithms applied to
K2
real-world.
Pre- -
requisites

CO / PO Mapping CO/PSO
(3/2/1 indicates strength of correlation) 3-Strong, 2 – Medium, 1 - Weak Mapping
COs Programme Outcomes (POs) PSOs
PO 1 PO PO 3 PO 4 PO 5 PO 6 PO 7 PO 8 PO 9 PO PO PO PSO PSO PSO
2 10 11 12 1 2 3
CO 1 3 3 2 2 2 3
CO 2 3 3 2 2 2 2 3
CO 3 3 3 2 2 3 2
CO 4 3 2 2 2 2 2 2 3 2
CO 5 3 2 2 2
Course Assessment Methods

Direct
1.Continuous Assessment Test I, II & III
2.Assignment
3.End-Semester examinations
Indirect
1. Course - end survey

Content of the syllabus


Unit – I INTRODUCTION Periods 9
Security trends - Legal, Ethical and Professional Aspects of Security, Need for Security at
Multiple levels, Security Policies - Model of network security – Security attacks, services and

226

Signature of BOS Chairman ECE


mechanisms – OSI security architecture – Classical encryption techniques: substitution
techniques, transposition techniques, steganography).- Foundations of modern
cryptography: perfect security – information theory – product cryptosystem – cryptanalysis.
Unit – II SYMMETRIC CRYPTOGRAPHY Periods 9
MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures - Modular
arithmetic-Euclid‘s algorithm- Congruence and matrices - Groups, Rings, Fields- Finite
fields- SYMMETRIC KEY CIPHERS: SDES – Block cipher Principles of DES – Strength of
DES – Differential and linear cryptanalysis - Block cipher design principles – Block cipher
mode of operation – Evaluation criteria for AES – Advanced Encryption Standard - RC4 –
Key distribution.
Unit – III PUBLIC KEY CRYPTOGRAPHY 9
MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing –
Factorization – Euler‘s totient function, Fermat‘s and Euler‘s Theorem - Chinese Remainder
Theorem – Exponentiation and logarithm - ASYMMETRIC KEY CIPHERS: RSA
cryptosystem – Key distribution – Key management – Diffie Hellman key exchange -
ElGamal cryptosystem – Elliptic curve arithmetic-Elliptic curve cryptography.
Unit – IV WEB SECURITY & OS SECURITY Periods 9
Overview, various types of web application vulnerabilities, Reconnaissance, Authentication, Authorization
(Fuzzing and Privilege Escalation), Session Management, Cross Site Scripting (XSS),Cross Site Request
Forgery (CSRF), SQL Injection and Blind SQL Injection. Memory and Address protection – Access
Control –file protection mechanisms –User authentication –models of security –Trusted OS design.
Unit – V SECURITY TESTING FOR WEB APPLICATIONS Periods 9
Case study of Client server application for a basic cryptosystem- Buffer overflow attack- Packet Sniffing
using Wireshark Tool to perform the traffic analysis attack- Password authentication. Performing attacks
and testing with attack tools.
Total Periods 45
Text Books
Atul Kahate, ―Cryptography and Network Security‖, 2nd Edition, Tata McGraw-Hill Education
1.
Pvt.Ltd., New Delhi, 2017.
William Stallings, Cryptography and Network Security: Principles and Practice, PHI
2.
3rd Edition, 2017.
References
Niels Ferguson, Bruce Schneier, Tadayoshi Kohno, ―Cryptography Engineering- Design
1.
Principles and Practical Applications‖, Wiley Publishing, Inc, Indiana, 2010.
2. Niels Ferguson and Bruce Schneier, ―Practical Cryptography‖, John Wiley and Sons, 2003.
3. BehrouzA.Foruzan, Cryptography and Network Security, Tata McGraw Hill 2007.
Brian Sullivan, Vincent Liu, ―Web Application security: A beginners guide, Tata McGraw Hill,
4.
2012.
Charles P Fleeger, Shari Lawrence P Fleeger, ―Security in Computing‖, Pearson Education,
5.
2004.
E-Resources
http://indexof.es/Cryptography/Cryptography%20and%20Network%20Security%20Principles%20
1.
and%20Practices,%204th%20Ed%20-%20William%20Stallings.pdf
2. https://bh.titichest.cyou/155.html
3. http://uru.ac.in/uruonlinelibrary/Cyber_Security/Cryptography_and_Network_Security.pdf

227

Signature of BOS Chairman ECE

You might also like