Professional Documents
Culture Documents
L T P C
3 0 0 3
The aim of this course is to introduce about information Security concepts to the students.
This course develops a basic understanding of goals, threats, attacks and mechanisms of
security, the algorithms and their design choices. The course also familiarizes students with a
few mathematical concepts used in cryptology. The course emphasizes to give a basic
understanding of attacks in cryptosystems as well, how to shield information from attacks. It
also deals with message authentication, Digital signatures and Network security.
Course Objectives:
Understand security concepts, Security goals, security threats, Security services and
mechanisms to counter them(L2)
Comprehend and apply Classical Encryption Techniques(L3)
Understand various symmetric cryptographic techniques. (L2)
Learn number theory related to Modern Cryptography. (L2)
Learn different kinds of Message Authentication Techniques. (L2)
Understand Application Security, Network and Transport layers. (L2)
UNIT I
10 L
Introduction: Computer Security Concepts, The OSI Security Architecture, Cryptography,
cryptanalysis, attacks, services, security mechanisms.
Classical Encryption Techniques: Substitution Techniques, Caesar Cipher, Monoalphabetic
Ciphers, Playfair Cipher, Hill Cipher Polyalphabetic Ciphers. Transposition Techniques.
Learning Outcomes:
After completion of this unit, the student will be able to
● illustrate different security attacks (L2)
● apply to problems related classical substitution methods (L3)
● explain Transposition techniques(L2)
UNIT II
10 L
Symmetric Key Cryptography: Block Ciphers and the Data Encryption Standard (DES)
algorithm. Differential and linear cryptanalysis, triple DES. Block cipher design principles,
Block cipher modes of operation, Advanced Encryption Standard (AES), Stream Ciphers:
RC4.
Learning Outcomes:
After completion of this unit, the student will be able to
distinguish between block and stream ciphers(L4)
explain and implement block cipher DES and AES algorithm (L2)
explain and implement stream cipher RC4 (L2)
UNIT III
10 L
Number theory: Divisibility and The Division Algorithm, The Euclidean Algorithm,
Modular Arithmetic, Prime Numbers, Fermat’s and Euler’s Theorems, Testing for Primality,
The Chinese Remainder Theorem. Public Key Cryptography: Principles of public key
cryptosystem, RSA algorithm, security of RSA. Diffie Hellman key exchange.
Learning Outcomes:
After completion of this unit, the student will be able to
UNIT IV
10 L
Cryptographic Hash Functions: Applications of hash Functions, Secure Hash Algorithm
(SHA) SHA-512, SHA 3. MAC and Digital Signatures: Message Authentication
Requirements, Message Authentication Functions, Requirements for Message Authentication
Codes, HMAC, DAA and CMAC. Digital signatures, Digital Signature Standard (DSS).
Authenticated Encryption: CCM, GCM.
Learning Outcomes:
After completion of this unit, the student will be able to
explain and implement hash functions SHA-512, SHA 3 (L2)
understand message authentication techniques HMAC, DAA and CMAC (L2)
explain digital signature technique Digital Signature Standard (DSS) (L2)
UNIT V
10 L
Key management and distribution: Distribution of Public Keys, X.509 Certificates
User Authentication: Kerberos transport-level security: SSL, TLS. Email Security: Pretty
Good Privacy (PGP), S/MIME. IP Security: IP security overview, IP security Policy,
Encapsulating Security Payload.
Learning Outcomes:
After completion of this unit, the student will be able to
explain transport-level security techniques (L2)
examine Application-level security techniques (L4)
explain Network-level security techniques(L2)
Course Outcomes:
After completion of this course, the student will be able to
Text Book(s):
1. William Stallings. Cryptography and Network Security – Principles and Practice, 7/e.
Pearson Education, 2017.
References:
1. Behrouz A Fourozen and Debdeep Mukhopadhyaya, Cryptography and Network
Security, 3/e, McGraw Hill, 2015.
2. Atul Kahate, Cryptography and Network Security, 4/e, McGraw Hill, 2019.
3. Introduction to Cryptography, Buchmann, Springer.
4. Applied Cryptography. 2nd Edition, Bruce Schneier, Johnwiley & Sons.
5. Introduction to Computer Networks and Cybersecurity Hardcover by Chwan-Hwa
(John) Wu ,J. David Irwin .CRC press.