0% found this document useful (0 votes)
29 views

Student Syllabus

This document provides a syllabus for a B.Tech course in Cryptography and Network Security. It outlines 5 units that will be covered: 1. Introduction to security attacks and cryptography fundamentals like conventional encryption techniques, modern block ciphers, and key distribution. 2. Number theory concepts like prime numbers, modular arithmetic, and public key cryptography algorithms like RSA, Diffie-Hellman, and elliptic curve cryptography. 3. Message authentication and hash functions including MACs, MD5, SHA, and digital signatures. 4. Authentication applications like Kerberos, X.509, PGP, and S/MIME. 5. IP security architecture, authentication headers, encapsulating security

Uploaded by

Anurag Pokhriyal
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views

Student Syllabus

This document provides a syllabus for a B.Tech course in Cryptography and Network Security. It outlines 5 units that will be covered: 1. Introduction to security attacks and cryptography fundamentals like conventional encryption techniques, modern block ciphers, and key distribution. 2. Number theory concepts like prime numbers, modular arithmetic, and public key cryptography algorithms like RSA, Diffie-Hellman, and elliptic curve cryptography. 3. Message authentication and hash functions including MACs, MD5, SHA, and digital signatures. 4. Authentication applications like Kerberos, X.509, PGP, and S/MIME. 5. IP security architecture, authentication headers, encapsulating security

Uploaded by

Anurag Pokhriyal
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Faculty of Uttaranchal Institute of Technology (UIT)

www.uttaranchaluniversity.ac.in
Premnagar, Dehradun (Uttarakhand) INDIA-248007

0135-2770319,0135-2770347 0135-2772231

Syllabus

Course : B.TECH. Year/Sem : 7 Branch : CSE

Subject : CRYTOGRAPHY & NETWORK SECURITY

Unit Sub Unit Topic

UNIT-1 Introduction to security attacks, services and mechanism, introduction to


cryptography , Conventional Encryption: Conventional encryption model ,
classical encryption techniques substitution ciphers and transposition
ciphers , cryptanalysis, stereography, stream and block ciphers , Modern
Block Ciphers: Block ciphers principals, Shannon¶s theory of confusion and
diffusion, fiestal structure , data encryption standard(DES), strength of
DES , differential and linear crypt analysis of DES, block cipher modes of
operations, triple DES , IDEA encryption and decryption , confidentiality
using conventional encryption, traffic confidentiality , key distribution,
random number generation
UNIT-2 Introduction to graph, ring and field, prime and relative prime numbers ,
modular arithmetic, Fermat¶s and Euler¶s theorem , primality testing,
Euclid¶s Algorithm, Chinese Remainder theorem , discrete logarithms.
Principals of public key crypto systems , RSA algorithm, security of RSA ,
key management, Diffie-Hellman key exchange algorithm , introductory
idea of Elliptic curve cryptography, Elganel encryption.
UNIT-3 Message Message Authentication and Hash Function , Authentication requirements,
Authentication and Hash authentication functions, message authentication code , hash functions,
Function: birthday attacks , security of hash functions and MACS, MD5 message
digest algorithm , Secure hash algorithm(SHA) , Digital Signatures: Digital
Signatures, authentication protocols , digital signature standards (DSS),
proof of digital signature algorithm.
UNIT-4 Authentication Authentication Applications: Kerberos and X.509 , directory authentication
Applications: service , electronic mail security-pretty good privacy (PGP) , S/MIME
UNIT-5 IP Security: IP Security: Architecture , Authentication header, Encapsulating security
payloads , combining security associations , key management
Web Security: Secure socket layer and transport layer security , secure electronic
transaction (SET) , System Security: Intruders, Viruses and related
threads , firewall design principals , trusted systems

You might also like