0% found this document useful (0 votes)
28 views

351E5C

The document outlines the syllabus for the B.Com. Degree Programme in Information System Management at the University of Madras, specifically for the Cryptography & Network Security course starting in 2023-2024. It includes learning objectives, course content divided into five units, and course outcomes related to security trends, cryptographic techniques, and authentication requirements. Additionally, it lists textbooks, reference materials, and web resources for further study.

Uploaded by

Elamathi L
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views

351E5C

The document outlines the syllabus for the B.Com. Degree Programme in Information System Management at the University of Madras, specifically for the Cryptography & Network Security course starting in 2023-2024. It includes learning objectives, course content divided into five units, and course outcomes related to security trends, cryptographic techniques, and authentication requirements. Additionally, it lists textbooks, reference materials, and web resources for further study.

Uploaded by

Elamathi L
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

UNIVERSITY OF MADRAS

B.COM. DEGREE PROGRAMME IN INFORMATION SYSTEM MANAGEMENT


SYLLABUS WITH EFFECT FROM 2023-2024

THIRD YEAR – SEMESTER – V

DISCIPLINE SPECIFIC ELECTIVE – 4 /4 : Cryptography & Network Security

Subject code Inst. Marks


L T P S Credits
Hours CIA External Total
351E5C 4 3 4 25 75 100
Learning Objectives
LO1 To understand on the security trends
LO2 To apply the mathematical symmetric key cryptography
LO3 To analyze the mathematics of asymmetric key cryptography
LO4 To imply the authentication requirements
LO5 To understand election mail survey and firewall
Prerequisite: Should have studied Commerce in XII Std
Contents No. of
Unit
Hours
Security trends – Legal, Ethical and Professional Aspects of Security, Need for
Security at Multiple levels, Security Policies – Model of network security – Security
attacks, services and mechanisms – OSI security architecture – Classical encryption
I 12
techniques: substitution techniques, transposition techniques, steganography-
Foundations of modern cryptography: perfect security – information theory – product
cryptosystem – cryptanalysis.
Mathematics of Symmetric Key Cryptography: Algebraic structures – Modular
arithmetic-Euclid‟s algorithm- Congruence and matrices -Groups, Rings, Fields- Finite
fields- SYMMETRIC KEY CIPHERS: SDES – Block cipher Principles of DES –
II 12
Strength of DES – Differential and linear cryptanalysis – Block cipher design
principles – Block cipher mode of operation – Evaluation criteria for AES – Advanced
Encryption Standard – RC4 – Key Distribution.
Mathematics of Asymmetric Key Cryptography: Primes – Primality Testing –
Factorization – Euler„s totient function, Fermat„s and Euler„s Theorem – Chinese
Remainder Theorem – Exponentiation and logarithm – ASYMMETRIC KEY
III 12
CIPHERS: RSA cryptosystem – Key distribution – Key management – Diffie Hellman
key exchange -ElGamal cryptosystem – Elliptic curve arithmetic-Elliptic curve
cryptography.
Authentication requirement – Authentication function – MAC – Hash function –
Security of hash function and MAC – SHA –Digital signature and authentication
IV 12
protocols – DSS- Entity Authentication: Biometrics, Passwords, Challenge Response
protocols- Authentication applications – Kerberos, X.509
Electronic Mail security – PGP, S/MIME – IP security – Web Security – SYSTEM
V 12
SECURITY: Intruders – Malicious software – viruses – Firewalls.
TOTAL 60
UNIVERSITY OF MADRAS
B.COM. DEGREE PROGRAMME IN INFORMATION SYSTEM MANAGEMENT
SYLLABUS WITH EFFECT FROM 2023-2024

CO Course Outcomes
CO1 Remember the security trends in cryptography and network security
CO2 Enumerate the algebra structures
CO3 Apply and analyze the key distribution of mathematical of asymmetrical key
CO4 Implication of authentication requirement and functions
CO5 Describe the electronic mail security and web security system
Textbooks
William Stallings, “Cryptography And Network Security – Principles and Practices”, Prentice Hall
1
of India, Third Edition, 2003.
Atul Kahate, “Cryptography and Network Security”, Tata McGraw-Hill, 2003.
2
3 Bruce Schneier, “Applied Cryptography”, John Wiley & Sons Inc, 2001.
Reference Books
Charles B. Pfleeger, Shari Lawrence Pfleeger, “Security in Computing”, Third Edition, Pearson
1
Education, 2003
2 William Stallings, Cryptography and Network security, Hardcover, 2016
NOTE: Latest Edition of Textbooks May be Used
Web Resources
https://www.google.co.in/books/edition/Cryptography_and_Network_Security/v8nCCwAA
1 QBAJ?hl=en&gl=in&kptab=editions&sa=X&ved=2ahUKEwiDnLTgxoP8AhXbpVYBH
d18CggQmBZ6BAgBEAc
https://www.google.co.in/books/edition/Cryptography_And_Network_Security_4_E/qKcrce
2 0x_2YC?hl=en&gbpv=1&dq=cryptography%20and%20network%20security&pg=PP1&prin
tsec=frontcover
https://www.google.co.in/books/edition/Introduction_to_Cryptography_and_Network/JGPDxwE
3
ACAAJ?hl=en
MAPPING WITH PROGRAMME OUTCOMES AND PROGRAMME SPECIFIC
OUTCOMES

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PSO1 PSO2 PSO3
CO1 3 3 3 2 3 2 3 3 3 2 2
CO2 3 2 2 3 2 2 2 2 3 2 3
CO3 3 3 3 2 3 2 3 3 3 2 2
CO4 3 2 2 2 2 2 2 2 3 2 2
CO5 3 3 3 3 3 2 3 3 3 2 3
TOTAL 15 13 13 12 13 10 13 13 15 10 12
AVERAGE 3 2.6 2.6 2.4 2.6 2 2.6 2.6 3 2 2.4
3 – Strong, 2- Medium, 1- Low

You might also like