CBIT – B.
Tech (R22) – CSE(AI)
IV [Link] – I Semester
(22E31702a) CRYTOGRAPHY & NETWORK SECURITY
(Professional Elective Course–IV)
(Common to CSE-AI & CSE-AI&ML)
[Link] [Link] Total Marks L T P C
30 70 100 3 0 0 3
Pre-Requisites: NIL
Course Objectives:
This course aims at training students to master the:
The concepts of classical encryption techniques and concepts of finite fields and number
theory
Working principles and utilities of various cryptographic algorithms including secret key
cryptography, hashes, and message digests, and public key algorithms
Design issues and working principles of various authentication protocols, PKI standards
Various secure communication standards including Kerberos, IPsec, TLS and email
Concepts of cryptographic utilities and authentication mechanisms to design secure
applications
Course Outcomes:
CO1: After completion of the course, students will be able to
CO2: Identify information security goals, classical encryption techniques and acquire fundamental
knowledge on the concepts of finite fields and number theory
CO3: Apply the knowledge of cryptographic checksums and evaluate the performance of different
message digest algorithms for verifying the integrity of varying message sizes.
CO4: Apply network security basics, analyse different attacks on networks and evaluate the
performance of firewalls and security protocols like TLS, IPSec, and PGP
CO5: Apply the knowledge of cryptographic utilities and authentication mechanisms to design
secure applications
UNIT I
Computer and Network Security Concepts: Computer Security Concepts, The OSI Security
Architecture, Security Attacks, Security Services, Security Mechanisms ,A Model for Network
Security, Classical Encryption Techniques : Symmetric Cipher Model ,Substitution Techniques,
Transposition Techniques ,Steganography, Block Ciphers : Traditional Block Cipher Structure, The
Data Encryption Standard, Advanced Encryption Standard :AES Structure, AES Transformation
Functions
UNIT II
Number Theory:
The Euclidean Algorithm, Modular Arithmetic, Fermat’s and Euler’s Theorems, The Chinese
Remainder Theorem, Discrete Logarithms, Finite Fields: Finite Fields of the Form GF(p), Finite
Fields of the Form GF(2n).Public Key Cryptography: Principles, Public Key Cryptography
Algorithms, RSA Algorithm, Diffie Hellman Key Exchange, Elliptic Curve Cryptography.
CBIT – [Link] (R22) – CSE(AI)
UNIT III
Cryptographic Hash Functions: Application of Cryptographic Hash Functions,Requirements &
Security, Secure Hash Algorithm, Message Authentication Functions, Requirements & Security,
HMAC & [Link] Signatures: NIST Digital Signature Algorithm, Distribution of Public
Keys, X.509 Certificates, Public-Key Infrastructure
UNIT IV
User Authentication: Remote User Authentication Principles, Kerberos. Electronic Mail Security:
Pretty Good Privacy (PGP) And S/MIME.
IP Security: IP Security Overview, IP Security Policy, Encapsulating Security Payload, Combining
Security Associations, Internet Key Exchange.
UNIT V
Transport Level Security: Web Security Requirements, Transport Layer Security (TLS), HTTPS,
Secure Shell(SSH)
Firewalls: Firewall Characteristics and Access Policy, Types of Firewalls, Firewall Location and
Configurations.
Textbooks:
1) Cryptography and Network Security- William Stallings, Pearson Education, 7thEdition.
2) Cryptography, Network Security and Cyber Laws – Bernard Menezes, Cengage Learning, 2010
edition.
Reference Books:
1) Cryptography and Network Security- Behrouz A Forouzan, DebdeepMukhopadhyaya, Mc-Graw
Hill, 3rd Edition,2015.
2) Network Security Illustrated, Jason Albanese and Wes Sonnenreich, MGH Publishers, 2003.
Online Learning Resources:
1) [Link] by Dr. Debdeep Mukhopadhyay IIT
Kharagpur
2) [Link] by [Link] IIT
Kharagpur [VideoLecture]
3) [Link]
articles by Mitel PowerConnections