1st year     2nd year     3rd year     4th year    



B.Tech. IV (CO) Semester - 7

L

T

P

C

CO403 : CRYPTOGRAPHY AND NETWORK SECURITY (CS-II)

3

1

2

5

COURSE OBJECTIVES
  • Introduce students to the concepts, technologies, practices and challenges associated with Information Security and Privacy.
  • Introduce the principles and practice of cryptography and network security.
  • Examine schemes in different standards, and evaluate their use in different situations.
COURSE OUTCOMES
After successful completion of this course, student will be able to
  • Understand the concepts related to the basics of cryptography and computer security.
  • Deduce the mechanisms to be employed while trying to satisfy any of the security services
  • Apply the concept of security services and mechanisms from the application developers and network administrator’s perspective.
COURSE CONTENT
  • INTRODUCTION AND OVERVIEW
  • (02 Hours)

  • ELEMENTARY NUMBER THEORY
  • (04 Hours)

    Finite fields, Arithmetic and algebraic algorithms

  • PSEUDO RANDOM BIT GENERATORS
  • (02 Hours)

  • FORMAL DEFINITION OF SECURE ENCRYPTION
  • (04 Hours)

    Perfect secrecy, Semantic security, IND-CPA, IND-CCA

  • STREAM CIPHERS
  • (04 Hours)

    One time pad, Security proof of one time pad

  • BLOCK CIPHERS
  • (04 Hours)

    Need for block ciphers, Luby-rackoff construction and its security proof, Modes of operation

  • HASH AND MAC FUNCTIONS
  • (04 Hours)

    Definitions, Notions of security and unaffordability (EUF-CMA), Merkle-Damgard family of hash functions

  • HARD PROBLEMS
  • (04 Hours)

    Discrete logarithm, Factorization

  • PUBLIC KEY CRYPTO SYSTEMS
  • (06 Hours)

    Diffie Hellman, RSA encryption; Proofs of security under hardness assumptions, Digital Signature

  • NETWORK SECURITY
  • (03 Hours)

  • IDENTITY MANAGEMENT
  • (03 Hours)

  • ADVANCED TOPICS
  • (02 Hours)

    (Total Contact Time: 42 Hours + 14 Hours = 56 Hours)

    PRACTICALS

    1. Implementation of Client side scripting
    2. Implementation of Server side scripting
    3. Implementation of mini project using above technology including the database connectivity

    BOOKS RECOMMENDED

    1. Dhiren Patel, Information Security: Theory and Practice, PHI, 2008/2010
    2. William Stallings, "Cryptography and Network Security - Principles and Practice", 6/E, Pearson Education, 2013.
    3. Douglas Stinson: "Cryptography: Theory and Practice, Third Edition", 3/E, Chapman and Hall/CRC, 2005
    4. Menezes Bernard, Network Security and Cryptography, Cengage Learning India, 2010
    5. Alfred. J. Menezes, Paul C. van Oorschot, Scott A. Vanstone: "Handbook of Applied Cryptography", 1/E, CRC, 1996