0% found this document useful (0 votes)
38 views3 pages

Cryptography and Network Security-syllabus

The document outlines the course structure for 'Cryptography and Network Security' (Course Code 22CS62), detailing learning outcomes, course contents divided into five units, textbooks, reference materials, assessment methods, and teaching pedagogy. Students will learn about cryptographic techniques, security protocols, and practical applications through lectures and case studies. The course includes continuous internal evaluations and a semester-end examination, with a total of 39 teaching hours and 3 credits.

Uploaded by

shakshi yadav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views3 pages

Cryptography and Network Security-syllabus

The document outlines the course structure for 'Cryptography and Network Security' (Course Code 22CS62), detailing learning outcomes, course contents divided into five units, textbooks, reference materials, assessment methods, and teaching pedagogy. Students will learn about cryptographic techniques, security protocols, and practical applications through lectures and case studies. The course includes continuous internal evaluations and a semester-end examination, with a total of 39 teaching hours and 3 credits.

Uploaded by

shakshi yadav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

CRYPTOGRAPHY AND NETWORK SECURITY

Course Code 22CS62 Credits 3

Hours/Week (L-T-P-S) 3-0-0 CIE Marks 50

Total Teaching Hours 39 SEE Marks 50

Exam Hours 3 Course Type Core

Course Component Engineering science

COURSE LEARNING OUTCOMES


Students will be able to:

1. Demonstrate a comprehensive understanding of basic concepts of cryptography and network


security and apply substitution and transposition techniques to solve real-world problems.
2. Analyze and evaluate different processes for hiding the information using Symmetric and
Asymmetric ciphers.
3. Practice Cryptographic Hash Functions, Message authentication codes and, Key Management and
Distribution techniques.
4. Analyze Transport-level Security and Wireless Network Security standards.
5. Analyze and Interpret precisely the E-Mail Security and Case Studies on Cryptography and security
COURSE CONTENTS

UNIT -1- (8 Hours)


Overview Security Concepts: Computer Security Concept, The OSI Security Architecture, Security Attacks,
Security Services, A Model for Network Security

Classical Encryption Techniques: substitution techniques, transposition techniques.

Chapter 1.1-1.6 2.2-2.3

UNIT -2- (8 Hours)


Symmetric key Ciphers: Traditional Block Cipher Structure, DES, AES.

Asymmetric key Ciphers: Principles of public key cryptosystems, RSA algorithm, Diffie- Hellman Key
Exchange.

Chapter 3.1-3.5,5.2-5.6,9.1-9.2,10.1

UNIT -3- (8 Hours)


Cryptographic Hash Functions: Message Authentication, Secure Hash Algorithm (SHA-512)

Message authentication codes: Authentication requirements, HMAC, CMAC. Digital Signatures

Key Management and Distribution: Distribution of Public Keys, X.509 Authentication Service.

Chapters11.1,11.5,12.1,12.5-12.6,13.1-13.2,14.3,14.4

UNIT -4- (8 Hours)


Transport-level Security: Web security considerations, Secure Socket Layer and Transport Layer Security,
HTTPS, Secure Shell (SSH)

Wireless Network Security: Wireless Security, Mobile Device Security, IEEE 802.11 Wireless LAN, IEEE
802.11i Wireless LAN Security.
Chapters 17.1-17.5,18.1-18.4

UNIT -5- (7 Hours)


E-Mail Security: Pretty Good Privacy, S/MIME

IP Security: IP Security overview, IP Security architecture, Authentication Header, Encapsulating security


payload, Combining security associations, Internet Key Exchange

Chapters 19.1-19.2, 20.1-20.5

Case Studies on Cryptography and security: Samples: Secure Multiparty Calculation, Virtual Elections, Single
sign On, Secure Inter-branch Payment Transactions, Cross site Scripting Vulnerability.

1.The Case Study Topics are integral part of the course.

2.No formal Lectures will be held for the Case Study topics

3.The topics prescribed for the Case Study are the part of Learning Assessment(LA) not part of Semester End
Examination.

TEXTBOOKS
SINO Unit Textbook Title Author(s) Publisher(s) Edition/Year of
Publication

1. 1,2,3,4,5 Cryptography and William Stallings Pearson 6th Edition


Network Security - Education
Principles and Practice

REFERENCE BOOKS
1 1,2,3,4,5 Cryptography and Atul Kahate Mc Graw Hill 3rd Edition
Network Security

2 1,2,3,4,5 Cryptography and C K Shyamala, N Wiley India 1st Edition


Network Security Harini, Dr T R
Padmanabhan

3 1,2,3,4,5 Cryptography and Forouzan Mc Graw Hill 3rd Edition


Network Security Mukhopadhyay

4 1,2,3,4,5 Information Security, Mark Stamp Wiley India 3rd Edition


Principles, and Practice

5 1,2,3,4,5 Principles of Computer WM. Arthur Conklin, TMH 5th Edition


Security Greg White

6 1,2,3,4,5 Introduction to Neal Krawetz CENGAGE 2007


Network security LEARNING

7 1,2,3,4,5 Network Security and Bernard Menezes CENGAGE 1st edition


Cryptography LEARNING

COURSE ASSESSMENT METHOD


Continuous Internal Evaluation (CIE):
The following weightages for CIE(Continuous Internal evaluation) will be followed for the course

1. There will be 2 MSEs in a semester. Each covers 2.5 units of the syllabus.

2. Each MSE is conducted for 50 Marks, for 1 hour 30 minutes duration.

3. Each MSE consists of PART-A and PART-B, where PART A carries 10 Marks comprising 5 questions
mandatory from 2 ½ units, each question carries 2 Marks with Blooms level -2.

4. PART-B consists of 3 full questions, one full question from each unit, each full question having 100%
percent choice. Each full unit carries 15 marks, and the partial unit will carry 10 marks, with Blooms level 3 or
4. This will be the same for the MSE-2.

5. Final MSE marks will be average of MSE1 and MSE2, finally scaled down to 30 marks.

Quiz covering all 5 Units (LA1) 10 Marks

Case Study Review (LA2) 20Marks

Total 50Marks

Semester End Examination (SEE):

SEE Exam: Max. Marks=100 Marks weightage 50%


PEDAGOGY

● Black Board teaching.


● Demonstrating every concept using powerpoint Presentations.

CO-PO-PSO MAPPING
CO PO
1 2 3 4 5 6 7 8 9 10 11 12 PSO1 PSO2 PSO3

1 3 - 3 - - - - - - - - - 3 3 -

2 3 3 - - - - - - - - - - 3 3 -

3 3 - 3 - - - - - - - - - 3 3 -

4 3 3 - - - - - - - - - - 3 3 -

5 3 3 - 2 - - - - 2 2 - 2 3 3 2

CL 3 3 3 2 - - - - 2 2 - 2 3 3 2

You might also like