0% found this document useful (0 votes)
32 views2 pages

Cryptography & Network Security Course

The document outlines the course structure for a B.Tech elective in Cryptography and Network Security, detailing objectives, outcomes, and content across five units. It covers classical encryption techniques, number theory, cryptographic algorithms, user authentication, and network security protocols. The course aims to equip students with the knowledge to design secure applications and understand various security mechanisms and standards.

Uploaded by

narasapuramsashi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views2 pages

Cryptography & Network Security Course

The document outlines the course structure for a B.Tech elective in Cryptography and Network Security, detailing objectives, outcomes, and content across five units. It covers classical encryption techniques, number theory, cryptographic algorithms, user authentication, and network security protocols. The course aims to equip students with the knowledge to design secure applications and understand various security mechanisms and standards.

Uploaded by

narasapuramsashi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

CBIT – B.

Tech (R22) – CSE(AI)


IV [Link] – I Semester
(22E31702a) CRYTOGRAPHY & NETWORK SECURITY
(Professional Elective Course–IV)
(Common to CSE-AI & CSE-AI&ML)

[Link] [Link] Total Marks L T P C


30 70 100 3 0 0 3

Pre-Requisites: NIL

Course Objectives:
This course aims at training students to master the:
 The concepts of classical encryption techniques and concepts of finite fields and number
theory
 Working principles and utilities of various cryptographic algorithms including secret key
cryptography, hashes, and message digests, and public key algorithms
 Design issues and working principles of various authentication protocols, PKI standards
 Various secure communication standards including Kerberos, IPsec, TLS and email
 Concepts of cryptographic utilities and authentication mechanisms to design secure
applications

Course Outcomes:
CO1: After completion of the course, students will be able to
CO2: Identify information security goals, classical encryption techniques and acquire fundamental
knowledge on the concepts of finite fields and number theory
CO3: Apply the knowledge of cryptographic checksums and evaluate the performance of different
message digest algorithms for verifying the integrity of varying message sizes.
CO4: Apply network security basics, analyse different attacks on networks and evaluate the
performance of firewalls and security protocols like TLS, IPSec, and PGP
CO5: Apply the knowledge of cryptographic utilities and authentication mechanisms to design
secure applications

UNIT I
Computer and Network Security Concepts: Computer Security Concepts, The OSI Security
Architecture, Security Attacks, Security Services, Security Mechanisms ,A Model for Network
Security, Classical Encryption Techniques : Symmetric Cipher Model ,Substitution Techniques,
Transposition Techniques ,Steganography, Block Ciphers : Traditional Block Cipher Structure, The
Data Encryption Standard, Advanced Encryption Standard :AES Structure, AES Transformation
Functions

UNIT II
Number Theory:
The Euclidean Algorithm, Modular Arithmetic, Fermat’s and Euler’s Theorems, The Chinese
Remainder Theorem, Discrete Logarithms, Finite Fields: Finite Fields of the Form GF(p), Finite
Fields of the Form GF(2n).Public Key Cryptography: Principles, Public Key Cryptography
Algorithms, RSA Algorithm, Diffie Hellman Key Exchange, Elliptic Curve Cryptography.
CBIT – [Link] (R22) – CSE(AI)

UNIT III
Cryptographic Hash Functions: Application of Cryptographic Hash Functions,Requirements &
Security, Secure Hash Algorithm, Message Authentication Functions, Requirements & Security,
HMAC & [Link] Signatures: NIST Digital Signature Algorithm, Distribution of Public
Keys, X.509 Certificates, Public-Key Infrastructure

UNIT IV
User Authentication: Remote User Authentication Principles, Kerberos. Electronic Mail Security:
Pretty Good Privacy (PGP) And S/MIME.
IP Security: IP Security Overview, IP Security Policy, Encapsulating Security Payload, Combining
Security Associations, Internet Key Exchange.

UNIT V
Transport Level Security: Web Security Requirements, Transport Layer Security (TLS), HTTPS,
Secure Shell(SSH)
Firewalls: Firewall Characteristics and Access Policy, Types of Firewalls, Firewall Location and
Configurations.

Textbooks:
1) Cryptography and Network Security- William Stallings, Pearson Education, 7thEdition.
2) Cryptography, Network Security and Cyber Laws – Bernard Menezes, Cengage Learning, 2010
edition.

Reference Books:
1) Cryptography and Network Security- Behrouz A Forouzan, DebdeepMukhopadhyaya, Mc-Graw
Hill, 3rd Edition,2015.
2) Network Security Illustrated, Jason Albanese and Wes Sonnenreich, MGH Publishers, 2003.

Online Learning Resources:


1) [Link] by Dr. Debdeep Mukhopadhyay IIT
Kharagpur
2) [Link] by [Link] IIT
Kharagpur [VideoLecture]
3) [Link]
articles by Mitel PowerConnections

You might also like