0% found this document useful (0 votes)
111 views2 pages

Cryptography and Network Security (Cs631) - 1546661271736

This document provides information about the Cryptography and Network Security course CS631. The course is offered over 60 teaching hours and 4 credits. It aims to teach students the principles of encryption algorithms, cryptography techniques, authentication methods, and how to solve security problems and build cryptosystems. The course is divided into 5 units covering topics such as classical encryption, public key cryptography, authentication and hash functions, network security, and system level security. Student evaluation includes a mid-semester exam, assignments, and an end semester exam.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
111 views2 pages

Cryptography and Network Security (Cs631) - 1546661271736

This document provides information about the Cryptography and Network Security course CS631. The course is offered over 60 teaching hours and 4 credits. It aims to teach students the principles of encryption algorithms, cryptography techniques, authentication methods, and how to solve security problems and build cryptosystems. The course is divided into 5 units covering topics such as classical encryption, public key cryptography, authentication and hash functions, network security, and system level security. Student evaluation includes a mid-semester exam, assignments, and an end semester exam.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

DEPARTMENT - ENGINEERING CSE

Course Pack
FOR
CRYPTOGRAPHY AND NETWORK SECURITY-CS631

CS631 - CRYPTOGRAPHY AND NETWORK SECURITY

Total Teaching Hours For Semester : 60 Total Teaching Hours For Semester : 4

Max Marks : 100 Credits : 4

Course Objectives/Course Description:


To understand the principles of encryption algorithms; conventional and public key cryptography. To have a detailed knowledge about authentication, hash functions and

application level security mechanisms.

Learning Outcome
Implement the principles and practices of cryptographic techniques. Solve generic security threats and vulnerabilities, and identify and analyse particular security

problems for a given application. Build simple cryptosystems by applying encryption algorithms, Comprehend secure identity management (authentication),

message authentication, and digital signature techniques.

Unit-1 Teaching Hours:12

INTRODUCTION
OSI Security Architecture - Classical Encryption techniques – Cipher Principles – Data Encryption
Standard – Block Cipher Design Principles and Modes of Operation - Evaluation criteria for AES – AES
Cipher – Triple DES – Placement of Encryption Function – Traffic Confidentiality
Unit-2 Teaching Hours:12

PUBLIC KEY CRYPTOGRAPHY


Key Management - Diffie-Hellman key Exchange – Elliptic Curve Architecture and Cryptography -
Introduction to Number Theory – Confidentiality using Symmetric Encryption – Public Key Cryptography
and RSA
Unit-3 Teaching Hours:12

AUTHENTICATION AND HASH FUNCTION


Authentication requirements – Authentication functions – Message Authentication Codes – Hash
Functions – Security of Hash Functions and MACs – MD5 message Digest algorithm - Secure Hash
Algorithm – RIPEMD – HMAC Digital Signatures – Authentication Protocols – Digital Signature Standard
Unit-4 Teaching Hours:12

NETWORK SECURITY
Authentication Applications: Kerberos – X.509 Authentication Service – Electronic Mail Security – PGP –
S/MIME - IP Security – Web Security
Unit-5 Teaching Hours:12

SYSTEM LEVEL SECURITY


Intrusion detection – password management – Viruses and related Threats – Virus Counter measures –
Firewall Design Principles – Trusted Systems, CASE-Study.
Text Books And Reference Books:
TEXT BOOKS1. William Stallings, “Cryptography And Network Security – Principles and Practices”, Pearson Education, 2013 REFERENCE BOOKS1.

Atul Kahate, “Cryptography and Network Security”, Tata McGraw-Hill, 2011.2. Bruce Schneier, “Applied Cryptography”, John Wiley & Sons Inc,
th
Reprint 2001.3. Charles B. Pfleeger, Shari Lawrence Pfleeger, “Security in Computing”, 5 Edition, Pearson Education, 2015.

Essential Reading / Recommended Reading:


IEEE PAPERS AND NPTEL VIDEOS

Evaluation Pattern
Continuous Internal Assessment (CIA) : 50% (50 marks out of 100 marks) End Semester Examination(ESE) : 50% (50 marks out of 100 marks) Components

of the CIACIA I : Subject Assignments / Online Tests : 10 marksCIA II : Mid Semester Examination (Theory) : 25 marks CIAIII:

Quiz/Seminar/Case Studies/Project/Innovative Assignments/presentations/publications : 10 marksAttendance

: 05 marks Total : 50 marks

You might also like