Professional Documents
Culture Documents
Sree Dattha Institute of Engineering & Science: Ec851Pe: Network Security and Cryptography
Sree Dattha Institute of Engineering & Science: Ec851Pe: Network Security and Cryptography
Course Outcomes: Upon completion of the Course, the students will be able to:
Blooms
CO DESCRIPTION Taxonomy
Describe network security fundamental concepts and principles
C422.1 L-2 Understand
Identify the virus, worms, firewalls and security services and the
C422.6 management of the security. L-2 Understand
TEXT BOOKS:
1. Cryptography and Network Security: Principles and Practice - William Stallings, Pearson Education.
2. Network Security: The complete reference, Robert Bragg, Mark Rhodes, TMH,2004.
REFERENCES:
1. Network Security Essentials (Applications and Standards) by William Stallings Pearson Education.
1. Less Matched
2. Moderately matched
3. Highly matched
EC851PE: NETWORK SECURITY AND CRYPTOGRAPHY
ASSIGNMENT: 1
.
3 Briefly define the classical encryption C422.2 L2-
techniques? Understand
4 Convert the following plain text message C422.2 L2-
P=”WE ARE IARE CSE STUDENTS” into Understand
cipher text with key K=”deceptive” with key
epetition.
5 Explain about block cipher principles? C422.2 L3-Apply
ASSIGNMENT: 2
ASSIGNMENT: 3
ASSIGNMENT: 4
ASSIGNMENT: 5
12 Convert “MEET ME” using Hill cipher with the L-2 Understand C422.1
key matrix Convert the cipher text back to
plaintext.
13 Write short notes on block cipher modes of L-2 Understand C422.2
operation
14 Discuss any four Substitution Technique and list L-4 Analyze C422.1
their merits and demerits.
15 Explain in detail about various types of attacks L-2 Understand C422.1
16 Explain in detail about various services provided L-2 Understand C422.1
by X.800
17 Explain in detail about various Mechanisms L-2 Understand C422.1
provided by X.800
18 Briefly explain the design principles of block L-3 Apply C422.2
cipher
19 Write short notes on L-1 Remember C422.1
(i)Fermat and Eluer’s theorem
(ii)Chinese Remainder theorem
20 Discuss with neat sketch a network security L-4 Analyze C422.1
model
21 Compare Substitution and Transposition L-6 Create C422.2
techniques.
24 Explain active and passive attack with example. L-2 Understand C422.1
Unit 2
14 List the evaluation criteria defined by NIST for L-3 Apply C422.3
AES?
15 State and explain the principles of public key L-2 Understand C422.4
cryptography?
16 .List the evaluation criteria defined by NIST for L-2 Understand C422.4
AES.
17 Explain prime and relatively prime numbers L-2 Understand C422.4
10 What are the steps involved in SET Transaction? L-2 Understand C422.6