20MCA261 Cryptography and Network Security syllabus for MCA



A d v e r t i s e m e n t

Module-1 Introduction 0 hours

Introduction:

OSI Security Architecture, Security Attacks, Security Services, Security Mechanism, model for Network Security.

Classical Encryption Technique:

Symmetric Cipher Model, Substitution Techniques, Transposition Techniques.

Module-2 Data Encryption and advanced encryption techniques 0 hours

Data Encryption and advanced encryption techniques:

Block Ciphers, Data Encryption Standard and Advanced Encryption Standard Block Cipher Principles, The Data Encryption Standard, Block Cipher Design Principles and Modes of operation, Evaluation Criteria for AES, AES Cipher-Encryption and Decryption, Data Structure, Encryption Round.

Public Key Cryptography and Key Management:

Principles of Public Key Cryptosystem, RSA algorithm, Key management, Diffie Hellman Key exchange.

Module-3 Message Authentication and Hash Function 0 hours

Message Authentication and Hash Function:

Authentication Requirement, Authentication Functions, Message Authentication Code, Hash Functions, Digital Signatures, Digital Signature Standard.

 

Authentication Applications:

Kerberos, X.509 Authentication Service

Module-4 Electronic Mail Security 0 hours

Electronic Mail Security:

Pretty Good Privacy (PGP), S/MIME

 

IP Security:

IP Security Overview;IP Security Architecture; Authentication Header; Encapsulating SecurityPayload; Combining Security Associations; Key Management.

Module-5 Web Security 0 hours

Web Security:

Web security Considerations; Secure Socket layer (SSL) and Transport layer Security (TLS); Secure Electronic Transaction (SET).

 

System Security:

Intruders, Intrusion Detection, Firewall Design Principles- Characteristics, Types of Firewall and Firewall Configuration.

 

Question Paper Pattern:

• The Question paper will have TEN questions • Each full question will be for 20 marks

• There will be 02 full questions (with maximum of four sub questions) from each module.

• Each full question will have sub questions covering all the topics under a module.

• The students will have to answer FIVE full questions, selecting one full question from each module.

 

Text books

1. William Stallings, “Cryptography and Network Security – Principles and Practices”, 4th Edition, Pearson Education, 2009. (Chapters: 1, 2.1-2.3, 3.1,3.2,3.5, 5.1,5.2, 6.2, 9.1,9.2, 10.1,10.2, 11.1- 11.4, 13.1, 13.3, 14.1, 4.2, 15.1, 15.2, 16.1-16.6, 17.1-17.3, 18.1, 18.2, 20.1; Exclude the topic not mentioned in the syllabus)

 

References

1. Behrouz A. Forouzan and DebdeepMukhopadhyay: “Cryptography and Network Security”, 2nd Edition, Tata McGraw-Hill, 2010.

2. AtulKahate, “Cryptography and Network Security” 2nd Edition TMH

Last Updated: Tuesday, January 24, 2023