Nothing Special   »   [go: up one dir, main page]

CB3491 - Syllabus

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

CB3491 CRYPTOGRAPHY AND CYBER SECURITY LTPC

COURSE OBJECTIVES: 3003


 Learn to analyze the security of in-built cryptosystems.
 Know the fundamental mathematical concepts related to security.
 Develop cryptographic algorithms for information security.
 Comprehend the various types of data integrity and authentication schemes
 Understand cyber-crimes and cyber security.
UNIT I INTRODUCTION TO SECURITY 9
Computer Security Concepts – The OSI Security Architecture – Security Attacks – Security Services
and Mechanisms – A Model for Network Security – Classical encryption techniques: Substitution
techniques, Transposition techniques, Steganography – Foundations of modern cryptography: Perfect
security – Information Theory – Product Cryptosystem – Cryptanalysis.

UNIT II SYMMETRIC CIPHERS 9


Number theory – Algebraic Structures – Modular Arithmetic - Euclid‘s algorithm – Congruence and
matrices – Group, Rings, Fields, Finite Fields SYMMETRIC KEY CIPHERS: SDES – Block Ciphers – DES,
Strength of DES – Differential and linear cryptanalysis – Block cipher design principles – Block cipher
mode of operation – Evaluation criteria for AES – Pseudorandom Number Generators – RC4 – Key
distribution.

UNIT III ASYMMETRIC CRYPTOGRAPHY 9


MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing – Factorization -
Euler’s totient function, Fermat’s and Euler’s Theorem – Chinese Remainder Theorem – Exponentiation
and logarithm ASYMMETRIC KEY CIPHERS: RSA cryptosystem – Key distribution – Key management –
Diffie Hellman key exchange -– Elliptic curve arithmetic – Elliptic curve cryptography.

UNIT IV INTEGRITY AND AUTHENTICATION ALGORITHMS 9


Authentication requirement – Authentication function – MAC – Hash function – Security of hash
function: HMAC, CMAC – SHA – Digital signature and authentication protocols – DSS – Schnorr Digital
Signature Scheme – ElGamal cryptosystem – Entity Authentication: Biometrics, Passwords, Challenge
Response protocols – Authentication applications – Kerberos MUTUAL TRUST: Key management and
distribution – Symmetric key distribution using symmetric and asymmetric encryption – Distribution of
public keys – X.509 Certificates.

UNIT V CYBER CRIMES AND CYBER SECURITY 9


Cyber Crime and Information Security – classifications of Cyber Crimes – Tools and Methods –Password
Cracking, Keyloggers, Spywares, SQL Injection – Network Access Control – Cloud Security – Web
Security – Wireless Security
TOTAL:45 PERIODS
COURSE OUTCOMES:

CO1: Understand the fundamentals of networks security, security architecture, threats and
vulnerabilities
CO2: Apply the different cryptographic operations of symmetric cryptographic algorithms
CO3: Apply the different cryptographic operations of public key cryptography
CO4: Apply the various Authentication schemes to simulate different applications.
CO5: Understand various cyber crimes and cyber security.

TEXT BOOKS

1. William Stallings, "Cryptography and Network Security - Principles and Practice", Seventh Edition,
Pearson Education, 2017.
2. Nina Godbole, Sunit Belapure, “Cyber Security: Understanding Cyber crimes, Computer Forensics
and Legal Perspectives”, First Edition, Wiley India, 2011.

REFERENCES

1. Behrouz A. Ferouzan, Debdeep Mukhopadhyay, "Cryptography and Network Security", 3rd Edition,
Tata Mc Graw Hill, 2015.
2. Charles Pfleeger, Shari Pfleeger, Jonathan Margulies, "Security in Computing", Fifth Edition,
Prentice Hall, New Delhi, 2015.

You might also like