0% found this document useful (0 votes)
109 views

Crypto

This document outlines the topics covered in the course ECS-084 Cryptography & Network Security. The course covers classical encryption techniques like substitution and transposition ciphers as well as modern techniques like block ciphers, AES, RSA, and hash functions. It also discusses key management, authentication applications like Kerberos and PGP, IP security concepts, and system security topics like intrusion detection and firewalls. References for further reading on cryptography and network security concepts are also provided.

Uploaded by

shivme0206
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
109 views

Crypto

This document outlines the topics covered in the course ECS-084 Cryptography & Network Security. The course covers classical encryption techniques like substitution and transposition ciphers as well as modern techniques like block ciphers, AES, RSA, and hash functions. It also discusses key management, authentication applications like Kerberos and PGP, IP security concepts, and system security topics like intrusion detection and firewalls. References for further reading on cryptography and network security concepts are also provided.

Uploaded by

shivme0206
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

ECS-084 Cryptography & Network Security

Unit-I Introduction to security attacks, services and mechanism, Classical encryption techniques substitution ciphers and transposition ciphers, cryptanalysis, steganography, Stream and block ciphers. Modern Block Ciphers: Block ciphers principles, Shannons theory of confusion and diffusion, fiestal structure, Data encryption standard(DES), Strength of DES, Idea of differential cryptanalysis, block cipher modes of operations, Triple DES Unit-II Introduction to group, field, finite field of the form GF(p), modular arithmetic, prime and relative prime numbers, Extended Euclidean Algorithm, Advanced Encryption Standard (AES) encryption and decryption Fermats and Eulers theorem, Primality testing, Chinese Remainder theorem, Discrete Logarithmic Problem, Principals of public key crypto systems, RSA algorithm, security of RSA Unit-III Message Authentication Codes: Authentication requirements, authentication functions, message authentication code, hash functions, birthday attacks, security of hash functions, Secure hash algorithm (SHA) Digital Signatures: Digital Signatures, Elgamal Digital Signature Techniques, Digital signature standards (DSS), proof of digital signature algorithm, Unit-IV Key Management and distribution: Symmetric key distribution, Diffie-Hellman Key Exchange, Public key distribution, X.509 Certificates, Public key Infrastructure. Authentication Applications: Kerberos Electronic mail security: pretty good privacy (PGP), S/MIME. Unit-V IP Security: Architecture, Authentication header, Encapsulating security payloads, combining security associations, key management. Introduction to Secure Socket Layer, Secure electronic, transaction (SET) System Security: Introductory idea of Intrusion, Intrusion detection, Viruses and related threats,firewalls References: 1. William Stallings, Cryptography and Network Security: Principals and Practice, Pearson Education. 2. Behrouz A. Frouzan: Cryptography and Network Security, Tata McGraw Hill 3. Bruce Schiener, Applied Cryptography. John Wiley & Sons 4. Bernard Menezes, Network Security and Cryptography, Cengage Learning. 5. Atul Kahate, Cryptography and Network Security, Tata McGraw Hill

You might also like