0% found this document useful (0 votes)
64 views

Professional Elective: Cryptography & Network Security

This document outlines the topics and chapters covered in a professional elective course on cryptography and network security. The course covers 6 units: (1) introduction to security architecture and cryptography; (2) encryption techniques like DES, AES, and RSA; (3) symmetric and public key encryption; (4) IP security including IPSec; (5) network threats and controls like VPNs and PKI; and (6) web and system security regarding SSL, intruders, and trusted operating systems. References are provided for each unit from chapters in cryptography and network security textbooks.

Uploaded by

Dinesh Rathi
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views

Professional Elective: Cryptography & Network Security

This document outlines the topics and chapters covered in a professional elective course on cryptography and network security. The course covers 6 units: (1) introduction to security architecture and cryptography; (2) encryption techniques like DES, AES, and RSA; (3) symmetric and public key encryption; (4) IP security including IPSec; (5) network threats and controls like VPNs and PKI; and (6) web and system security regarding SSL, intruders, and trusted operating systems. References are provided for each unit from chapters in cryptography and network security textbooks.

Uploaded by

Dinesh Rathi
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Professional Elective:

Cryptography & Network Security


Topics Reference
Unit I: Introduction: OSI Security CHAPTER 1
Architecture, Security Attacks:
Threats, Vulnerability and Controls,
Security Services: Confidentiality,
Integrity, Availability.
Introduction to Cryptography,
Conventional Encryption: CHAPTER 2
Conventional encryption model -
classical encryption techniques
Unit II: Encryption and
Decryption: Characteristics of Good
Encryption Technique: Properties of
Trustworthy Encryption Systems; CHAPTER 13
Types of Encryption Systems: Based
on Key, Based on Block; Confusion
and Diffusion; Cryptanalysis
Unit III: Symmetric Key
Encryption and Public Key
Encryption: Data Encryption
Standard (DES) Algorithm: Double
and Triple DES, Security of the DES; CHAPTER 3
Advanced Encryption Standard
(AES) Algorithm, DES and AES
Comparison, RSA Technique, Digital
Signature.
Unit IV: IP Security: Overview of IP
Security (IPSec); IP Security
Architecture; Modes of Operation;
Security Associations, Security
Parameter Index (SPI), SA CHAPTER 6
Management, Security Policy:
Authentication Header (AH);
Encapsulating Security Payload
(ESP); Internet Key Exchange.

11
Unit V: Network Concepts; Threats
in Networks, Threats in Transit:
Eavesdropping and
Wiretapping, Protocol Flaws,
Impersonation; Network Security CHAPTER 7
Controls: Architecture, Encryption,
Virtual Private
Networks, Public Key Infrastructure
(PKI) and Certificates
Unit VI: Web and System Security:
Web Security: Secure socket layer CHAPTER 8
and transport layer security, Secure
Electronic transaction, System
Security: Intruders, Viruses and
related threads; Network Security
Controls: CHAPTER 10
Architecture, Public Key
Infrastructure (PKI) and Certificates,
Security Features of Trusted
Operating Systems.

12

You might also like