You are on page 1of 4

Regulation 2018 Semester III / IV Total Hours 15

Course Hours / Week


Category Course Name C
Code L T P
M 18LEM103T Cryptography and Network Security 3 0 0 -

Prerequisite Course (s)


Computer Networks
Course Objective (s):
The purpose of learning this course is to:
To understand the difference between stream ciphers & block ciphers, present an
CLR-1: overview of the Festal Cipher and explain the encryption and decryption, present an
overview of DES,. Triple DES, Blowfish, IDEA

CLR-2: Presents the basic principles of public key cryptography, distinct uses of public key
cryptosystems.

CLR-3: Know the overview of the basic structure of cryptographic functions, Message
Authentication Codes, Understand the operation of SHA-512, HMAC, Digital Signature
To learn an overview of techniques for remote user authentication, Kerberos, Summarize
CLR-4: Web Security threats and Web traffic security approaches, overview of SSL & TLS.
Present an overview of electronic mail security
CLR-5: Provide an overview of IP Security, concept of security association, Intrusion Detection
Techniques
Course Outcome (s) (Cos):
At the end of this course, learners will be able to:
CO1 Explain various classical encryption techniques.
CO2 Understand block ciphers and write Symmetric key cryptographic algorithms.
Apply Cryptographic Hash Functions & and verify messages using well known signature
CO3
generation and verification algorithms.
CO4 Discuss User Authentication, Transport Layer Security & Email Security
CO5 Describe IP Security & Intrusion Detection Systems
CO-PO Mapping
POs PSOs
COs PSO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1
2
CO1 3 - - - - - - 2 - - - 2 - -

CO2 3 2 3 - - - - 2 - - - 2 3 -

CO3 3 2 - - - - - 1 - - - 2 3 -

CO4 2 - - - - - - 3 - - - 2 - -

CO5 2 - - - - - - 2 - - - 2 - -

B.Tech - Artificial Intelligence and Data Science Curriculum and Syllabus | 2018 1
Regulation
CO
2.6 2 3 0 0 0 0 5 0 0 0 2 3 0
(Avg)

1: Slight (Low) 2: Moderate (Medium) 3: Substantial (High)

B.Tech - Artificial Intelligence and Data Science Curriculum and Syllabus | 2018 2
Regulation
UNIT I Classical Encryption Techniques 2
Introduction: Security attacks, services & mechanisms, Symmetric Cipher Model, Substitution
Techniques, Transportation Techniques, Cyber threats and their defense( Phishing Defensive
measures, web based attacks, SQL injection & Defense techniques), Buffer overflow & format
string vulnerabilities, TCP session hijacking(ARP attacks, route table modification) UDP hijacking
( man-in-the-middle attacks).
UNIT II Block Ciphers & Symmetric Key Cryptography 4
Traditional Block Cipher Structure, DES, Block Cipher Design Principles, AES-Structure,
Transformation functions, Key Expansion, Blowfish, CAST-128, IDEA, Block Cipher Modes of
Operations
UNIT III Number Theory & Asymmetric Key Cryptography 4
Number Theory: Prime and Relatively Prime Numbers, Modular Arithmetic, Fermat’s and Euler’s
Theorems, The Chinese Remainder theorem, Discrete logarithms.
Public Key Cryptography: Principles, public key cryptography algorithms, RSA Algorithms, Diffie
Hellman Key Exchange, Elgamal encryption & decryption, Elliptic Curve Cryptography.

UNIT IV Cryptographic Hash Functions & Digital Signatures 2


Application of Cryptographic hash Functions, Requirements & Security, Secure Hash Algorithm,
Message Authentication Functions, Requirements & Security, HMAC & CMAC. Digital
Signatures, NIST Digital Signature Algorithm. Key management & distribution.
UNIT V IP Security & Intrusion Detection Systems 3
IP Security: IP Security Overview, IP Security Architecture, Authentication Header, Encapsulating
Security Payload, Combining Security Associations and Key Management.
Intrusion detection: Overview, Approaches for IDS/IPS, Signature based IDS, Host based IDS/IPS.
Reference (s)
1 Everyday Cryptography, Fundamental Principles & Applications, Keith Martin, Oxford
2 Network Security & Cryptography, Bernard Menezes, Cengage,2010
Text Books

1 Cryptography & Network Security: Principles and Practices, William Stallings, PEA, Sixth
edition.
Introduction to Computer Networks & Cyber Security, Chwan Hwa Wu, J.David Irwin,
2
CRC press
3 Hack Proofing your Network, Russell, Kaminsky, Forest Puppy, Wiley Dreamtech.
Web References
1 https://www.geeksforgeeks.org/cryptography-and-its-types/
2 https://nptel.ac.in/courses/106105031

B.Tech - Artificial Intelligence and Data Science Curriculum and Syllabus | 2018 3
Regulation
B.Tech - Artificial Intelligence and Data Science Curriculum and Syllabus | 2018 4
Regulation

You might also like