0% found this document useful (0 votes)
447 views

Nc7201 Communication Network Security L T P C

This document outlines the units of study for a course on communication network security. The five units cover: data encryption standards like DES and AES; public key encryption and hash functions including RSA and digital signatures; network security practices such as authentication protocols and IP security; electronic mail security protocols like PGP and S/MIME; and wireless network security issues and protocols including WEP and security for 4G networks. The course aims to give students an understanding of both classical and modern cryptographic techniques as well as their applications to secure communication networks.

Uploaded by

Afrin Banu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
447 views

Nc7201 Communication Network Security L T P C

This document outlines the units of study for a course on communication network security. The five units cover: data encryption standards like DES and AES; public key encryption and hash functions including RSA and digital signatures; network security practices such as authentication protocols and IP security; electronic mail security protocols like PGP and S/MIME; and wireless network security issues and protocols including WEP and security for 4G networks. The course aims to give students an understanding of both classical and modern cryptographic techniques as well as their applications to secure communication networks.

Uploaded by

Afrin Banu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

NC7201 COMMUNICATION NETWORK SECURITY L T P C

3 0 0 3
UNIT I DATA ENCRYPTION STANDARD 9
Services Mechanisms and Attacks OSI security Architecture Model for Network Security
Classical Encryption Techniques Symmetric Cipher Model Substitution Techniques
Transposition Techniques Rotor Machines Stenography Block Ciphers and Data
EncryptionStandard Simplified DES Block Cipher Principles, Data Encryption Standard
Strength of DES Differential and Linear Crypt Analysis, Block Cipher Design Principles Block
Cipher Modes ofOperation.
UNIT II ADVANCED ENCRYPTION STANDARD 9
Advanced Encryption Standard Evaluation Criteria for AES, AES Cipher Contemporary
Symmetric Ciphers Triple DES, Blowfish, RC5 Characteristics of Advanced Symmetric Block
Ciphers RC4 Stream Cipher Confidentiality using Symmetric Encryption Placement of
Encryption Function Traffic Confidentiality Key Distribution and Random Number
Generation.
UNIT III PUBLIC KEY ENCRYPTION AND HASH FUNCTIONS 9
Public Key Cryptography and RSA Principles of Public Key Cryptosystems RSA Algorithm
Key Management and other public key cryptosystems Key Management DiffieHellman Key
Exchange Elliptic Curve Arithmetic Elliptic Curve Cryptography Message Authentication
andHash Functions Authentication Requirements Authentication Functions Message
Authentication Codes Hash Functions and MACs; Hash Algorithms MD5 Message Digest
Algorithm, Secure Hash Algorithm RIPEMD 160, HMAC Digital Signatures and Authentication
Protocols Digital Signature Standards .
UNIT IV NETWORK SECURITY PRACTICE 9
Authentication Applications Kerberos X.509 Authentication Service Electronic Mail Security
Pretty Good Privacy S/MIME IP Security IP Security Overview IP Security Architecture
Authentication Header Encapsulating Security Payload Combining Security Associations
Web Security Web Security Considerations Secure Sockets Layer and Transport Layer
Security Secure Electronic Transaction .
UNIT V WIRELESS NETWORK SECURITY 9
Security Attack issues specific to Wireless systems: Worm hole, Tunneling, DoS. WEP for Wi-Fi
network, Security for 4G networks: Secure Ad hoc Network, Secure Sensor Network.
TOTAL: 45 PERIODS
TEXT BOOKS:
1. William Stallings, Network Security Essentials, 2nd edition, Prentice Hall of India New
Delhi, 2004.
2. Charlie Kaufman, Network Security Private Communication in Public World 2nd edition,
Prentice Hall of India New Delhi, 2004.
REFERENCES:
1. William Stallings, Cryptography and Network Security, 3rd edition, Prentice Hall of India,
New Delhi, 2004.
2. R.K.Nichols and P.C. Lekkas , Wireless Security Mc Graw Hill 2002

You might also like