You are on page 1of 3

19ECS305: CRYPTOGRAPHY AND NETWORK SECURITY

L T P C
3 0 0 3

The aim of this course is to introduce about information Security concepts to the students.
This course develops a basic understanding of goals, threats, attacks and mechanisms of
security, the algorithms and their design choices. The course also familiarizes students with a
few mathematical concepts used in cryptology. The course emphasizes to give a basic
understanding of attacks in cryptosystems as well, how to shield information from attacks. It
also deals with message authentication, Digital signatures and Network security.

Course Objectives:
 Understand security concepts, Security goals, security threats, Security services and
mechanisms to counter them(L2)
 Comprehend and apply Classical Encryption Techniques(L3)
 Understand various symmetric cryptographic techniques. (L2)
 Learn number theory related to Modern Cryptography. (L2)
 Learn different kinds of Message Authentication Techniques. (L2)
 Understand Application Security, Network and Transport layers. (L2)

UNIT I
10 L
Introduction: Computer Security Concepts, The OSI Security Architecture, Cryptography,
cryptanalysis, attacks, services, security mechanisms.
Classical Encryption Techniques: Substitution Techniques, Caesar Cipher, Monoalphabetic
Ciphers, Playfair Cipher, Hill Cipher Polyalphabetic Ciphers. Transposition Techniques.
Learning Outcomes:
After completion of this unit, the student will be able to
● illustrate different security attacks (L2)
● apply to problems related classical substitution methods (L3)
● explain Transposition techniques(L2)

UNIT II
10 L
Symmetric Key Cryptography: Block Ciphers and the Data Encryption Standard (DES)
algorithm. Differential and linear cryptanalysis, triple DES. Block cipher design principles,
Block cipher modes of operation, Advanced Encryption Standard (AES), Stream Ciphers:
RC4.
Learning Outcomes:
After completion of this unit, the student will be able to
 distinguish between block and stream ciphers(L4)
 explain and implement block cipher DES and AES algorithm (L2)
 explain and implement stream cipher RC4 (L2)

UNIT III
10 L
Number theory: Divisibility and The Division Algorithm, The Euclidean Algorithm,
Modular Arithmetic, Prime Numbers, Fermat’s and Euler’s Theorems, Testing for Primality,
The Chinese Remainder Theorem. Public Key Cryptography: Principles of public key
cryptosystem, RSA algorithm, security of RSA. Diffie Hellman key exchange.
Learning Outcomes:
After completion of this unit, the student will be able to

 understand the concept of divisibility, Modularity and primality (L2)


 implement RSA. (L4)
 explain Diffie Hellman key exchange method (L2)

UNIT IV
10 L
Cryptographic Hash Functions: Applications of hash Functions, Secure Hash Algorithm
(SHA) SHA-512, SHA 3. MAC and Digital Signatures: Message Authentication
Requirements, Message Authentication Functions, Requirements for Message Authentication
Codes, HMAC, DAA and CMAC. Digital signatures, Digital Signature Standard (DSS).
Authenticated Encryption: CCM, GCM.
Learning Outcomes:
After completion of this unit, the student will be able to
 explain and implement hash functions SHA-512, SHA 3 (L2)
 understand message authentication techniques HMAC, DAA and CMAC (L2)
 explain digital signature technique Digital Signature Standard (DSS) (L2)

UNIT V
10 L
Key management and distribution: Distribution of Public Keys, X.509 Certificates
User Authentication: Kerberos transport-level security: SSL, TLS. Email Security: Pretty
Good Privacy (PGP), S/MIME. IP Security: IP security overview, IP security Policy,
Encapsulating Security Payload.
Learning Outcomes:
After completion of this unit, the student will be able to
 explain transport-level security techniques (L2)
 examine Application-level security techniques (L4)
 explain Network-level security techniques(L2)

Course Outcomes:
After completion of this course, the student will be able to

 distinguish between Symmetric and Asymmetric cryptosystems (L4)


 analyze and implement Symmetric Classical Ciphers (L4)
 explain Hash functions and its algorithms (L2)
 apply Digital signature and its algorithms (L3)
 discuss public key distribution, Kerberos (L6)
 understand security at application and transportation layers. (L2)

Text Book(s):
1. William Stallings. Cryptography and Network Security – Principles and Practice, 7/e.
Pearson Education, 2017.
References:
1. Behrouz A Fourozen and Debdeep Mukhopadhyaya, Cryptography and Network
Security, 3/e, McGraw Hill, 2015.
2. Atul Kahate, Cryptography and Network Security, 4/e, McGraw Hill, 2019.
3. Introduction to Cryptography, Buchmann, Springer.
4. Applied Cryptography. 2nd Edition, Bruce Schneier, Johnwiley & Sons.
5. Introduction to Computer Networks and Cybersecurity Hardcover by Chwan-Hwa
(John) Wu ,J. David Irwin .CRC press.

You might also like