Introduction:
OSI Security Architecture, Security Attacks, Security Services, Security Mechanism, model for Network Security.
Classical Encryption Technique:
Symmetric Cipher Model, Substitution Techniques, Transposition Techniques.
Data Encryption and advanced encryption techniques:
Block Ciphers, Data Encryption Standard and Advanced Encryption Standard Block Cipher Principles, The Data Encryption Standard, Block Cipher Design Principles and Modes of operation, Evaluation Criteria for AES, AES Cipher-Encryption and Decryption, Data Structure, Encryption Round.
Public Key Cryptography and Key Management:
Principles of Public Key Cryptosystem, RSA algorithm, Key management, Diffie Hellman Key exchange.
Message Authentication and Hash Function:
Authentication Requirement, Authentication Functions, Message Authentication Code, Hash Functions, Digital Signatures, Digital Signature Standard.
Authentication Applications:
Kerberos, X.509 Authentication Service
Electronic Mail Security:
Pretty Good Privacy (PGP), S/MIME
IP Security:
IP Security Overview;IP Security Architecture; Authentication Header; Encapsulating SecurityPayload; Combining Security Associations; Key Management.
Web Security:
Web security Considerations; Secure Socket layer (SSL) and Transport layer Security (TLS); Secure Electronic Transaction (SET).
System Security:
Intruders, Intrusion Detection, Firewall Design Principles- Characteristics, Types of Firewall and Firewall Configuration.
Question Paper Pattern:
• The Question paper will have TEN questions • Each full question will be for 20 marks
• There will be 02 full questions (with maximum of four sub questions) from each module.
• Each full question will have sub questions covering all the topics under a module.
• The students will have to answer FIVE full questions, selecting one full question from each module.
Text books
1. William Stallings, “Cryptography and Network Security – Principles and Practices”, 4th Edition, Pearson Education, 2009. (Chapters: 1, 2.1-2.3, 3.1,3.2,3.5, 5.1,5.2, 6.2, 9.1,9.2, 10.1,10.2, 11.1- 11.4, 13.1, 13.3, 14.1, 4.2, 15.1, 15.2, 16.1-16.6, 17.1-17.3, 18.1, 18.2, 20.1; Exclude the topic not mentioned in the syllabus)
References
1. Behrouz A. Forouzan and DebdeepMukhopadhyay: “Cryptography and Network Security”, 2nd Edition, Tata McGraw-Hill, 2010.
2. AtulKahate, “Cryptography and Network Security” 2nd Edition TMH