351E5C
351E5C
CO Course Outcomes
CO1 Remember the security trends in cryptography and network security
CO2 Enumerate the algebra structures
CO3 Apply and analyze the key distribution of mathematical of asymmetrical key
CO4 Implication of authentication requirement and functions
CO5 Describe the electronic mail security and web security system
Textbooks
William Stallings, “Cryptography And Network Security – Principles and Practices”, Prentice Hall
1
of India, Third Edition, 2003.
Atul Kahate, “Cryptography and Network Security”, Tata McGraw-Hill, 2003.
2
3 Bruce Schneier, “Applied Cryptography”, John Wiley & Sons Inc, 2001.
Reference Books
Charles B. Pfleeger, Shari Lawrence Pfleeger, “Security in Computing”, Third Edition, Pearson
1
Education, 2003
2 William Stallings, Cryptography and Network security, Hardcover, 2016
NOTE: Latest Edition of Textbooks May be Used
Web Resources
https://www.google.co.in/books/edition/Cryptography_and_Network_Security/v8nCCwAA
1 QBAJ?hl=en&gl=in&kptab=editions&sa=X&ved=2ahUKEwiDnLTgxoP8AhXbpVYBH
d18CggQmBZ6BAgBEAc
https://www.google.co.in/books/edition/Cryptography_And_Network_Security_4_E/qKcrce
2 0x_2YC?hl=en&gbpv=1&dq=cryptography%20and%20network%20security&pg=PP1&prin
tsec=frontcover
https://www.google.co.in/books/edition/Introduction_to_Cryptography_and_Network/JGPDxwE
3
ACAAJ?hl=en
MAPPING WITH PROGRAMME OUTCOMES AND PROGRAMME SPECIFIC
OUTCOMES
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PSO1 PSO2 PSO3
CO1 3 3 3 2 3 2 3 3 3 2 2
CO2 3 2 2 3 2 2 2 2 3 2 3
CO3 3 3 3 2 3 2 3 3 3 2 2
CO4 3 2 2 2 2 2 2 2 3 2 2
CO5 3 3 3 3 3 2 3 3 3 2 3
TOTAL 15 13 13 12 13 10 13 13 15 10 12
AVERAGE 3 2.6 2.6 2.4 2.6 2 2.6 2.6 3 2 2.4
3 – Strong, 2- Medium, 1- Low