Vous êtes sur la page 1sur 2

Course Code 21ECPE703C

Category Professional Elective Course - III


Course title Secured Signal Processing for Communication
Scheme and No. of Hours/week Semester - VI
Credits L T P S Cred
S its
4 0 0 0 4 No. of teaching hours: 48
CIE Marks: 50 SEE Marks: Total Max. Marks: 100 Duration of SEE: 3 Hrs
50
Pre-requisites (if any): Probability theory and linear algebra

Unit 1
Introduction on security, Principles of Security, security goals, Need
for Security, Security Approaches and types of attacks: Passive
attack, active attack, attacks on confidentiality, attacks on integrity
and availability, Security services and mechanisms.
Modular arithmetic: Groups, Ring, Fields. The Euclidean algorithm,
Finite fields of the form GF(p) Polynomial arithmetic: Finite fields
of the form GF (2n). 9hrs

Unit 2
Symmetric Ciphers, Symmetric Cipher Model, Substitution
Techniques, Caesar Cipher, Mono alphabetic Cipher, Play fair
cipher, Hill cipher, Poly alphabetic Cipher, one time pad
Transposition techniques ,Block Ciphers, Data encryption
Standards, DES Encryption, DES decryption. Differential and
Linear Crypt analysis, Advanced Encryption standard , The AES
Cipher, substitute bytes transformation, Shift row transformation,
Mix Column transformation. Public key cryptosystem, Application
for Public key cryptosystem requirements.
10hrs
Unit 3
RSA algorithm, Key management, Distribution of public key, public
key certificates, Distribution of secret keys. Intruders: Intrusion
techniques, Intrusion detection, Statistical anomaly detection, Rule
based intrusion detection, Distributed intrusion detection, Honey
pot, Intrusion detection exchange format. Password management:
Password protection, password selection strategies.
9 hrs
Unit 4
One-Way Hash Functions: Background, Snefru, N-Hash, MD4,
MD5, Secure Hash Algorithm [SHA],One way hash functions using
symmetric block algorithms, Using public key algorithms, Choosing
a one-way hash functions, Message Authentication Codes. Digital
Signature Algorithm, Discrete Logarithm Signature Scheme
E-mail Security: Pretty Good Privacy-S/MIME. IP Security: IP
Security Overview, IP Security Policy, Encapsulation Security
Payload (ESP), combining security Associations. Web Security:
Web Security Considerations, SSL
10hrs
Unit 5
Cryptographic Applications Cryptography on the Internet
Cryptography for wireless local area networks Cryptography for
mobile telecommunications Cryptography for secure payment card
transactions Cryptography for video broadcasting Cryptography for
identity cards Cryptography for home users.

10h
Text Books:
1. Behrouz A. Forouzan , Cryptography and Network security Tata
McGraw-Hill, 2008
2. William Stallings, Cryptography and Network security: principles
and practice", 2nd Edition, Prentice Hall of India, New Delhi, 2002
3. Bruce Schneier, “Applied Cryptography Protocols, Algorithms,
and Source code in C”, Wiley Publications, 2nd Edition, ISBN:
9971-51348-X
4. Information Security: Principles and Practice, 2nd Edition by
Mark Stamp Wiley
5. Everyday Cryptography: Fundamental Principles and
Applications Keith M. Martin Oxford Scholarship Online:
December 2013

References:
1. David S. Dummit & Richard M Foote, Abstract Algebra, 2nd
Edition, Wiley India Pvt. Ltd., 2008. 2. Douglas A. Stinson,
Cryptography, Theory and Practice, 2/e, Chapman & Hall, CRC
Press Company, Washington, 2005.
3. Lawrence C. Washington, Elliptic Curves: Theory and
Cryptography, Chapman & Hall, CRC Press Company, Washington,
2008.
4. N. Koeblitz: A course in Number theory and Cryptography, 2008
5. Thomas Koshy: Elementary Number Theory with Applications,
2/e, Academic Press, 2007
6. Tyagi and Yadav , Cryptography and network security,
Dhanpatrai, 2012
7. Cryptography and Network Security, Behrouz A. Forouzan,
TMH, 2007.
8. Cryptography and Network Security, Atul Kahate, TMH, 2003.

Vous aimerez peut-être aussi