Sri Chandrasekharendra Saraswathi Viswa Mahavidyalaya Department of Computer Science and Engineering
Page 125 of 162
L T P C 3 2 0 3
CS8T2 - CRYPTOGRAPHY AND NETWORK SECURITY
(For Students admitted from 2014 onwards)
PRE-REQUISITE :
Basic knowledge of discrete mathematics (algebra), information theory and Analysis of Algorithms
AIM:
The aim of the course is to provide necessary foundations to apply cryptography techniques in new, security challenges in emerging systems and wireless networks.
OBJECTIVES:
The Objective of this Course is to impart knowledge on :
• Extensive, detailed and critical understanding of the concepts, issues, principles and theories of computer network security
• Detailed and practical understanding of formalisms for specifying security related properties and validating them using model checking
• Critical theoretical and detailed practical knowledge of a range of computer network security technologies as well as network security tools and services
• Practical experience of analyzing, designing, implementing and validating solutions to computer network security challenges using common network security tools and formal methods.
OUTCOME:
After completion of the course the students are expected to be able to:
• The different security goals and how they can be achieved by means of cryptography
• Cryptographic mechanisms: encryption, data authentications, entity authentication, digital signatures
• Understand the concepts and foundations of computer security, and identify vulnerabilities of IT systems.
• Use basic security tools to enhance system security.
• Develop basic security enhancements in stand-alone applications.
UNIT - I INTRODUCTION
Introduction to Network Security - Attacks- Services- Mechanism – Conventional Encryption Principle – Cipher Principles – Data Encryption Standard – Block Cipher Design Principles and Modes of Operation - Triple DES – Placement of Encryption Function – Traffic Confidentiality – Key Distribution.
UNIT - II
PUBLIC KEY CRYPTOGRAPHY
Introduction to Public Key Cryptography – RSA - Diffie-Hellman key Exchange - Key Management-Session and Interchange keys, Key exchange and generation-PKI
Sri Chandrasekharendra Saraswathi Viswa Mahavidyalaya Department of Computer Science and Engineering
Page 126 of 162 UNIT - III
AUTHENTICATION AND HASH FUNCTION
Authentication requirements – Authentication functions – Message Authentication Codes – Hash Functions – Security of Hash Functions and MACs – MD5 message Digest algorithm - Secure Hash Algorithm – HMAC - Digital Signatures – Authentication Protocols – Digital Signature Standard
UNIT- IV NETWORK SECURITY
Authentication Applications: Kerberos – X.509 Authentication Service – Electronic Mail Security – PGP – S/MIME - IP Security – Web Security.
UNIT- V
SYSTEM LEVEL SECURITY
Intrusion detection – password management – Viruses and related Threats – Virus Counter measures – Firewall Design Principles – Trusted Systems.
TEXT BOOK:
William Stallings, “Cryptography and Network Security – Principles and Practices”, Prentice Hall of India, Fourth Edition 2006.
REFERENCES :
1. Atul Kahate, “Cryptography and Network Security”, Third Edition, Tata McGraw- Hill,2013.
2. Bruce Schneier, “Applied Cryptography”, Second Edition, John Wiley & Sons Inc, 2007.
3. Charles B. Pfleeger, Shari Lawrence Pfleeger, “Security in Computing”, Third Edition, Pearson Education, 2003