0% found this document useful (0 votes)
15 views2 pages

Network Security & Cryptography

The document outlines the course structure for CS 4019: Network Security & Cryptography, detailing its objectives, units of study, and learning outcomes. Key topics include cryptographic techniques, internet security protocols, user authentication, and intrusion detection systems. Upon completion, students will be equipped to implement security measures and tools to protect networks and data.

Uploaded by

10321210130
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views2 pages

Network Security & Cryptography

The document outlines the course structure for CS 4019: Network Security & Cryptography, detailing its objectives, units of study, and learning outcomes. Key topics include cryptographic techniques, internet security protocols, user authentication, and intrusion detection systems. Upon completion, students will be equipped to implement security measures and tools to protect networks and data.

Uploaded by

10321210130
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

L T P C

CS 4019 NETWORK SECURITY & CRYPTOGRAPHY 3 1 0 4


Course Category: Pre-requisite :
Co-requisite:
Designed by Computer Science & Engineering

COURSE OBJECTIVE:-

To learn & implement the various concepts of network security

UNIT COURSE CONTENTS CONTACT


HOURS
UNIT-I Introduction Plain text and cipher text, substitution techniques, transposition 8
techniques, encryption and decryption, symmetric and asymmetric key
cryptography.

UNIT-II Number Theory – Prime number – Modular arithmetic – Euclid’s algorithm - 9


Fermet’s and Euler’s theorem – Key distribution – Key management – Diffie
Hellman key exchange Symmetric key algorithms: introduction, algorithms types
and modes, DES, AES.
Asymmetric key algorithms: introduction, history of asymmetric key
cryptography, RSA symmetric and asymmetric key cryptography together, Digital
signature.

UNIT-III 10
Internet security protocols: basic concepts, Secure Socket Layer (SSL), Transport
Layer Security (TLS), Secure Hyper Text Transfer protocol (SHTTP), Time
Stamping Protocol (TSP), Secure Electronic Transaction (SET), SSL versus SET,
Email Security.

UNIT-IV User Authentication and Kerberos: Introduction, Authentication basics, Passwords, 9


authentication tokens, certificate based authentication

UNIT-V Intruder– Intrusion detection system Virus and related threats Countermeasures – 9
Firewalls
design principles – Trusted systems – Practical implementation of cryptography
and security

LEARNING OUTCOME:

On completion of this course, the students will be able to:-


1. Comprehend and implement various cryptographic algorithms to protect the confidential data.
2. Identify network vulnerabilities and apply various security mechanisms to protect networks from
security attacks.
3. Apply security tools to locate and fix security leaks in a computer network/software.
4. Secure a web server and web application
5. Configure firewalls and IDS

Learning Resources
Text Book 1. Cryprotography and Network Security, 2nd Edition
by Atul Kahate, TMH
2. Network Management Principles & Practices by
Subramanian, Mani (AWL)
3. SNMP, Stalling, Willian (AWL)
Reference Book and other 1. SNMP: A Guide to Network Management (MGH)
materials 2. Telecom Network Management by H.H. Wang (MGH)
3. Network Management by U. Dlack (MGH)

You might also like