You are on page 1of 4

CRYPTOGRAPHY AND NETWORK SECURITY UNIT I OSI Security Architecture INTRODUCTION 10 - Classical Encryption techniques Cipher Principles Data

ta Encryption Standard Block Cipher Design Principles and Modes of Operation Evaluation criteria for AES AES Cipher Triple DES Placement of Encryption Function Traffic Confidentiality. S.N o 1. OSI security Architecture 2. Classical Encryptions Techniques : Symmetric cipher model Substitution Techniques 3. 4. 5. 6. Modes of operation 7. Evaluation criteria for AES 8. 9. 10. 11. AES cipher Triple DES Placement of Encryption Function Traffic confidentiality Transportation Techniques Rotar Machines - Steganography Cipher principles Data encryption standard Topics to be covered Text/Ref T7- T14 T23-T30 T44- T47 T63- T72 T72- T81 T91- T98 T140T143 T143T167 T174T179 T202T210 T210T211

UNIT II 10

PUBLIC KEY CRYPTOGRAPHY

Key Management - Diffie-Hellman key Exchange Elliptic Curve Architecture and Cryptography - Introduction to Number Theory Confidentiality using Symmetric Encryption Public Key Cryptography and RSA. S.No 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. UNIT III 9 Authentication requirements Authentication functions Message Authentication Codes Hash Functions Security of Hash Functions and MACs MD5 message Digest algorithm - Secure Hash Algorithm RIPEMD HMAC Digital Signatures Authentication Protocols Digital Signature Standard S.No 24. 25. 26. 27. Topics to be covered Authentication Requirements Authentication functions Message Authentication codes Hash functions Text/Ref T312- T313 T313- T324 T324- T328 T328- T334 Topics to be covered Key management Diffie Hellman key exchange Elliptic curve Architecture and cryptography Introduction to Number theory Prime numbers Fermats and Eulers Theorems Testing for Primality The Chinese Remainder Theorem-Discrete logarithms Confidentiality using symmetric Encryption Key distribution Random Number Generation Public key cryptography principles of Public key cryptosystems The RSA Algorithm. Text/Ref T286- T293 T293- T296 T304- T308 T236-T239 T239- T243 T243-T245 T245-T252 T202-T211 T211-T220 T220-T227 T259-T268 T268-T278

AUTHENTICATION AND HASH FUNCTION

28. 29. 30. 31. 32. 33. 34. UNIT IV

Security of Hash Functions and MACs MD5 Message Digest Algorithm Secure Hash Algorithm. RIPEMD HMAC Digital Signature Authentication Protocols Digital Signatures Standard NETWORK SECURITY

T335- T338 T348- T357 T357- T364 T365- T372 T372- T376 T384- T391 T392- T395 8

Authentication Applications: Kerberos X.509 Authentication Service Electronic Mail Security PGP S/MIME - IP Security Web Security. S.No 35. 36. 37. 38. 39. 40. 41. 42. UNIT V Topics to be covered Authentication Applications: Kerberos X.509 Authentication services Electronic mail Security-PGP S/MIME IP Security Overview-Architecture Authentication Header-ESP Combining Security Payload-Key mgmt. Web Security SYSTEM LEVEL SECURITY Text/Ref T402T419 T419T428 T436T455 T455T472 T482T491 T491T501 T501T515 T528T560 8

Intrusion detection password management Viruses and related Threats Virus Counter measures Firewall Design Principles Trusted Systems. S.No Topics to be covered Text/Ref

43. 44. 45. 46. 47. 48.

Intrusion Detection Password Management Viruses and related Threats Virus counter measures Firewall Design Principles Trusted Systems.

T569- T581 T581- T591 T598- T609 T609- T613 T616- T628 T628- T634

TEXTBOOK: 1. William Stallings, Cryptography And Network Security Principles and Practices, Prentice Hall of India, Third Edition, 2003.

You might also like