Cyptography and Network Security
Cyptography and Network Security
B. Introduction: This course is offered by the Department of IoT and Intelligent systems which provides students with a comprehensive
introduction to fundamental and advanced security concepts. Students will explore the principles of confidentiality, integrity, and
availability within the OSI security architecture and foundational topics such as number theory and probability in cryptography. The
course covers classical and modern cryptographic techniques, including block and stream ciphers, pseudorandom number
generation, and cryptographic hash functions. Additionally, it delves into public-key cryptography methods like RSA, Diffie-Hellman,
and elliptic curve cryptography, alongside digital signature schemes. Students will also learn to implement operating system security
measures, including authentication, access control, firewalls, and backups. Practical insights into security administration and
corporate espionage provide a real-world perspective on securing systems against evolving cyber threats.
C. Course Outcomes:
Target
CO Statement CO Level Target Attainment % Attainment
level
[PO. 1] Engineering knowledge: apply the knowledge of mathematics, computer science, and communication engineering
fundamentals to the solution of complex engineering problems.
[PO. 2] Problem analysis: identify, formulate, review research literature, and analyse complex engineering problems reaching
substantiated conclusions using basic principles of mathematics, computing techniques and communication engineering
principles.
[PO. 3] Design/development of solutions: design solutions for complex engineering problems and design system components or
processes that meet the specified requirements with appropriate consideration for law, safety, cultural & societal obligations
with environmental considerations.
[PO. 4] Conduct investigations of complex problems: use research-based knowledge and research methods including design of
experiments, analysis and interpretation of data, and synthesis of the information to provide valid conclusions.
[PO. 5] Modern tool usage: create, select, and apply appropriate techniques, resources, and modern engineering and IT tools
including prediction and modelling to complex engineering activities with an understanding of the limitations.
[PO. 6] The engineer and society: apply reasoning informed by the contextual knowledge to assess societal, health, safety, legal and
cultural issues and the consequent responsibilities relevant to the professional engineering practice.
[PO. 7] Environment and sustainability: understand the impact of the professional engineering solutions in societal and
environmental contexts, and demonstrate the knowledge of, and need for sustainable development.
[PO. 8] Ethics: apply ethical principles and commit to professional ethics, responsibilities and norms of the engineering practice.
[PO. 9] Individual and teamwork: function effectively as an individual, and as a member or leader in diverse teams, and in
multidisciplinary settings.
[PO. 10] Communication: communicate effectively for all engineering processes & activities with the peer engineering team,
community and with society at large. Clarity of thoughts, being able to comprehend and formulate effective reports and design
documentation, make effective presentations, and give and receive clear instructions.
[PO. 11] Project management and finance: demonstrate knowledge and understanding of the engineering and management principles
and apply these to one’s own work, as a member and leader in a team, to manage projects and in varied environments.
[PO. 12] Life-long learning: recognize the need for and have the preparation and ability to engage in independent and life-long learning
in the broadest context of technological change.
[PSO.1] Apply the fundamental knowledge of computer science and engineering in developing effective software/hardware for real
world complex engineering problems by adapting advanced technologies.
[PSO.2] Analyze and configure various IoT based innovative and smart applications using recent hardware and software tools.
[PSO.3] Design industrial IoT based solutions for improving operational efficiency at home and industry automation systems.
E. Assessment Plan:
F. Syllabus:
Introduction: confidentiality, integrity, availability, OSI security architecture; Number theory: finite fields, Galois field, primes, primality testing,
factoring algorithms; Probability and information theory: Shannon’s theory, perfect security; Classical ciphers; Block ciphers: DES, AES,
electronic codebook mode, cipher block chaining mode, cipher feedback mode, output feedback mode, counter mode; Pseudorandom number
generation; Stream ciphers; Cryptographic hash functions; Message authentication codes; Public-key cryptography: computational security,
computational assumptions, RSA, ElGamal, elliptic curve cryptography, digital signatures, Diffie- Hellman key exchange; Operating systems
security: security capabilities of different platforms, identification, authentication, user accounts, file permissions, backups, access control,
firewalls, methods of protection, ownership, assessing and securing a system, information warfare, security administration, corporate espionage
REFERENCE BOOKS
1. W. Stallings, "Cryptography and Network Security, Principles and Practices", 6th Edition, Pearson Education, 2013.
2. B. A. Forouzan, “Cryptography and Network Security”, 3rd Edition, McGraw Hill, 2015.
3. Atul Kahate, Cryptography and Network Security, 2nd Edition, McGraw Hill, 2008.
4. D. Stinson, Cryptography: Theory and Practice, (4e), CRC Press, 2018.
5. Pieprzyk, T. Hardjono, J. Seberry, “Fundamentals of Computer Security”, springer- Verlag Berlin Heidelberg, 2013.
6. C. P. Pfleeger, “Security in Computing”, 4th Edition, Prentice Hall, 2014.
G. Lecture Plan:
Mode of
Lecture
Major Topics Topics Mode of Delivery Corresponding CO Assessing the
No.
Outcome
Introduction and
1 course handout Course handout Lecture NA NA
briefing
confidentiality, integrity Class Quiz
and availability
2 Lecture [IIS2242.1] Mid-Term
Introduction:
Lecture Class Quiz
3-4 OSI security architecture; [IIS2242.1] Mid-Term
Number theory:
Class Quiz
7 factoring algorithms Lecture [IIS2242.1] Mid-Term
End-Term
Class Quiz
Shannon’s theory and
8-9 Lecture [IIS2242.1] Mid-Term
perfect security
Probability and
information
theory: Class Quiz
10-11 Classical ciphers Lecture [IIS2242.2] Mid-Term
Class Quiz
13-14 AES Lecture [IIS2242.2] Mid-Term
End-Term
Class Quiz
18 Stream ciphers Lecture [IIS2242.2]
End-Term
Class Quiz
Cryptographic hash
19 Lecture [IIS2242.2] Mid-Term
functions
End-Term
Mid-Term Exam
firewalls, methods of
protection, ownership, End-Term
33-34 Flip Activity [IIS2242.4]
assessing and securing a
system
information warfare,
security administration, End-Term
35-37 corporate espionage Flip Activity [IIS2242.4]
END-TERM EXAM
H. Course Articulation Matrix: