22MCA261 Cryptography and Network Security syllabus for MCA



A d v e r t i s e m e n t

Module-1 INTRODUCTION 0 hours

INTRODUCTION :

Computer Security Concepts, The OSI Security Architecture, Security Attacks, Security Services, Security Mechanisms, A Model for Network Security.

 

CLASSICAL ENCRYPTION TECHNIQUES:

Symmetric Cipher Model, Substitution Techniques, Transposition Techniques, Steganography.

Module-2 BLOCK CIPHERS AND THE DATA ENCRYPTION STANDARD 0 hours

BLOCK CIPHERS AND THE DATA ENCRYPTION STANDARD:

Block Cipher Principles, The Data Encryption Standard (DES), A DES Example, The Strength of DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles.

BLOCK CIPHER OPERATION:

Multiple Encryption and Triple DES, Electronic Codebook Mode, Cipher Block Chaining Mode, Cipher Feedback Mode, Output Feedback Mode, Counter Mode.

STREAM CIPHERS :

Stream Ciphers, RC4.

Module-3 NUMBER THEORY 0 hours

NUMBER THEORY-:

Divisibility and the Division Algorithm, The Euclidean Algorithm, Modular Arithmetic, Prime Numbers, Fermat‟s and Euler‟s Theorems, Testing for Primality, The Chinese Remainder Theorem, Discrete Logarithms. PUBLIC-KEY CRYPTOGRAPHY, RSA AND OTHER PUBLIC-KEY CRYPTOSYSTEMS: Principles of Public-Key Cryptosystems, The RSA Algorithm, DiffieHellman Key Exchange, ElGamal Cryptosystem.

Module-4 CRYPTOGRAPHIC HASH FUNCTIONS 0 hours

CRYPTOGRAPHIC HASH FUNCTIONS:

Applications of Cryptographic Hash Function, Two Simple Hash Functions, 195 G V P College of Engineering (Autonomous) 2013 Requirements and Security, Hash Functions Based on Cipher Block Chaining, Secure Hash Algorithm (SHA).

MESSAGE AUTHENTICATION CODES :

Message Authentication Requirements, Message Authentication Functions, Message Authentication Codes, Security of MACs, MACs Based on Hash Functions (HMAC).

Module-5 DIGITAL SIGNATURES 0 hours

DIGITAL SIGNATURES-

Digital Signatures, ElGamal Digital Signature Scheme, Schnorr Digital Signature Scheme, Digital Signature Standard (DSS).

KEY MANAGEMENT AND DISTRIBUTION:

Symmetric Key Distribution Using Symmetric Encryption, Symmetric Key Distribution Using Asymmetric Encryption, Distribution of Public Keys, X.509 Certificates, Public Key Infrastructure.

 

Assessment Details (both CIE and SEE)

  • The weightage of Continuous Internal Evaluation (CIE) is 50% and for Semester End Exam (SEE) is 50%.
  • The minimum passing mark for the CIE is 50% of the maximum marks. Minimum passing marks in SEE is 40% of the maximum marks of SEE.
  • A student shall be deemed to have satisfied the academic requirements and earned the credits allotted to each subject/ course if the student secures not less than 50% (50 marks out of 100) in the sum total of the CIE (Continuous Internal Evaluation) and SEE (Semester End Examination) taken together.

 

Continuous Internal Evaluation:

1. Three Unit Tests each of 20 Marks

2. Two assignments each of 20 Marks or one Skill Development Activity of 40 marks to attain the COs and POs

The sum of three tests, two assignments/skill Development Activities, will be scaled down to 50 marks

CIE methods /question paper is designed to attain the different levels of Bloom’s taxonomy as per the outcome defined for the course.

 

Semester End Examination:

1. The SEE question paper will be set for 100 marks and the marks scored will be proportionately reduced to 50.

2. The question paper will have ten full questions carrying equal marks.

3. Each full question is for 20 marks. There will be two full questions (with a maximum of four sub-questions) from each module.

4. Each full question will have a sub-question covering all the topics under a module.

5. The students will have to answer five full questions, selecting one full question from each module

 

Suggested Learning Resources:

Text Books:

1.William Stallings: Cryptography And Network Security- Principles And Practice, 5th Edition, Pearson/PHI, 2011.

 

Reference books:

1. William Stallings, “Network Security Essentials (Applications and Standards)”, 4th Edition, Pearson Education. ,2012

2. Charlie Kaufman, Radia Perlman and Mike Speciner: “Network Security – Private Communication in a Public World”, 2nd Edition, Pearson/PHI, 2002.

3. Eric Maiwald: “Fundamentals of Network Security”, 1st Edition, Dreamtech Press, 2003.

4. Whitman: “Principles of Information Security”, 3rd Edition, Thomson, 2009.

5. Robert Bragg, Mark Rhodes: “Network Security: The complete reference”, 1st Edition, TMH, 2004.

6. Buchmann: “Introduction to Cryptography”, 2nd Edition, Springer, 2004.

 

Skill Development Activities Suggested

  • The students with the help of the course teacher can take up technical –activities which will enhance their skill or the students should interact with industry (small, medium and large), understand their problems or foresee what can be undertaken for study in the form of research/testing/projects, and for creative and innovative methods to solve the identified problem. The prepared report shall be evaluated for CIE marks.

 

Course outcome (Course Skill Set)

At the end of the course the student will be able to :

CO1 Analyze and design classical encryption techniques and block ciphers L2

CO2 Understand and analyze data encryption standard. L2

CO3 Understand and analyze public-key cryptography, RSA and other public-key cryptosystems L2

CO4 Understand key management and distribution schemes and design User Authentication, such as Diffie-Hellman Key Exchange, ElGamal Cryptosystem, etc L2

CO5 Analyze and design hash and MAC algorithms, and digital signatures L2

 

Program Outcome of this course

1 Engineering knowledge: Apply the knowledge of mathematics, science, engineering fundamentals, and computer science and business systems to the solution of complex engineering and societal problems. PO1

2 Problem analysis: Identify, formulate, review research literature, and analyze complex engineering and business problems reaching substantiated conclusions using first principles of mathematics, natural sciences, and engineering sciences. PO2

3 Design/development of solutions: Design solutions for complex engineering problems and design system components or processes that meet the specified needs with appropriate consideration for the public health and safety, and the cultural, societal, and environmental considerations. PO3

4 Conduct investigations of complex problems: Use research-based knowledge and research methods including design of experiments, analysis and interpretation of data, and synthesis of the information to provide valid conclusions. PO4

5 Modern tool usage: Create, select, and apply appropriate techniques, resources, and modern engineering and IT tools including prediction and modeling to complex engineering activities with an understanding of the limitations PO5

6 The engineer and society: Apply reasoning informed by the contextual knowledge to assess societal, health, safety, legal and cultural issues and the consequent responsibilities relevant to the professional engineering and business practices. PO6

7 Environment and sustainability: Understand the impact of the professional engineering solutions in business societal and environmental contexts, and demonstrate the knowledge of, and need for sustainable development. PO7

8 Ethics: Apply ethical principles and commit to professional ethics and responsibilities and norms of the engineering and business practices. PO8

9 Individual and team work: Function effectively as an individual, and as a member or leader in diverse teams, and in multidisciplinary settings. PO9

10 Communication: Communicate effectively on complex engineering activities with the engineering community and with society at large, such as, being able to comprehend and write effective reports and design documentation, make effective presentations, and give and receive clear instructions. PO10

11 Project management and finance: Demonstrate knowledge and understanding of the engineering, business and management principles and apply these to one‟s own work, as a member and leader in a team, to manage projects and in multidisciplinary environments. PO11

12 Life-long learning: Recognize the need for, and have the preparation and ability to engage in independent and life-long learning in the broadest context of technological change. PO12

Last Updated: Tuesday, January 24, 2023