Vous êtes sur la page 1sur 2

Course Description

Title of Course: Cryptography and Network Security


Course Code: 10B25CI853
L-T Scheme: 3-0 Course Credit: 3

Objectives
The course covers fundamental aspects of security in a modern networked environment
with the focus on system design aspects and cryptography in the specific context of
network / internetwork security. It also dwells into basics of cryptographic techniques,
algorithms and protocols required to achieve these properties; computational issues in
implementing cryptographic protocols and algorithms; and system/application design
issues in building secure networked systems.

Learning Outcomes
After completing this course, students will be able to explain common attacks against
network assets, the associated threats and vulnerabilities, and what network security
personnel do to secure assets. They would be able to protect information in an
organization by using authentication and access control. They would be able to identify
types of security policies to manage operational security, and then use these policies to
ensure compliance by users in an organization.

Course Contents
Foundation of Security & Cryptography: OSI security architecture, Classical encryption
techniques. Mathematical Tools for Cryptography: Finite fields, number theory. Block
Ciphers: Design principles, Data encryption standard, advanced encryption standard,
multiple encryption and Triple DES, Block cipher modes of operation.

Public Key Cryptography: RSA, Key management, Diffie-Hellman key exchange,


Elliptic curve Arithmetic, Elliptic curve cryptography. Message authentication and Hash
functions. Hash and MAC algorithms: Secure hash algorithm, HMAC.

Digital Signature, Certificates & Standards. Authentication Applications: Kerberos,


X.509 authentication service. Electronic Mail Security: PGP, S/MIME. IP Security
Protocols.

System Security: Computer virus, Firewall & Intrusion detection, trusted systems,
Security investigation.

Teaching Methodology
Lectures would be interactive and it would cover the core concepts that are explained in
the text and reference materials with adequate examples. Tutorials will have conceptual
and numerical questions that would aid in strengthening the cryptographic principles.
Evaluation Scheme
Test – 1 : 15 marks
Test – 2 : 25 marks
Test – 3 : 35 marks
Assignments : 5 marks
Tutorial/Problem Solving : 10 marks
Quizzes : 5 marks
Attendance : 5 marks
Total : 100 marks

Text Books
1. William Stallings: Cryptography and Network Security. 4th Edition. Prentice-Hall,
Englewood Cliffs, 2006.

Reference Books
1. Bruce Schneider: Applied Cryptography, Wiley Student Edition, 2nd Edition,
Singapore, 1996.
2. C.Kauffman, R.Perlman and M.Spenser: Network Security, Second Edition, Prentice
Hall, Englewood Cliffs, 2002.
3. S.Bellovin and W.Chesvick: Internet Security and Firewalls, Second Edition, Addison-
Wesley, Reading, 1998.

Vous aimerez peut-être aussi