INTRODUCTION :
Computer Security Concepts, The OSI Security Architecture, Security Attacks, Security Services, Security Mechanisms, A Model for Network Security.
CLASSICAL ENCRYPTION TECHNIQUES:
Symmetric Cipher Model, Substitution Techniques, Transposition Techniques, Steganography.
BLOCK CIPHERS AND THE DATA ENCRYPTION STANDARD:
Block Cipher Principles, The Data Encryption Standard (DES), A DES Example, The Strength of DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles.
BLOCK CIPHER OPERATION:
Multiple Encryption and Triple DES, Electronic Codebook Mode, Cipher Block Chaining Mode, Cipher Feedback Mode, Output Feedback Mode, Counter Mode.
STREAM CIPHERS :
Stream Ciphers, RC4.
NUMBER THEORY-:
Divisibility and the Division Algorithm, The Euclidean Algorithm, Modular Arithmetic, Prime Numbers, Fermat‟s and Euler‟s Theorems, Testing for Primality, The Chinese Remainder Theorem, Discrete Logarithms. PUBLIC-KEY CRYPTOGRAPHY, RSA AND OTHER PUBLIC-KEY CRYPTOSYSTEMS: Principles of Public-Key Cryptosystems, The RSA Algorithm, DiffieHellman Key Exchange, ElGamal Cryptosystem.
CRYPTOGRAPHIC HASH FUNCTIONS:
Applications of Cryptographic Hash Function, Two Simple Hash Functions, 195 G V P College of Engineering (Autonomous) 2013 Requirements and Security, Hash Functions Based on Cipher Block Chaining, Secure Hash Algorithm (SHA).
MESSAGE AUTHENTICATION CODES :
Message Authentication Requirements, Message Authentication Functions, Message Authentication Codes, Security of MACs, MACs Based on Hash Functions (HMAC).
DIGITAL SIGNATURES-
Digital Signatures, ElGamal Digital Signature Scheme, Schnorr Digital Signature Scheme, Digital Signature Standard (DSS).
KEY MANAGEMENT AND DISTRIBUTION:
Symmetric Key Distribution Using Symmetric Encryption, Symmetric Key Distribution Using Asymmetric Encryption, Distribution of Public Keys, X.509 Certificates, Public Key Infrastructure.
Assessment Details (both CIE and SEE)
Continuous Internal Evaluation:
1. Three Unit Tests each of 20 Marks
2. Two assignments each of 20 Marks or one Skill Development Activity of 40 marks to attain the COs and POs
The sum of three tests, two assignments/skill Development Activities, will be scaled down to 50 marks
CIE methods /question paper is designed to attain the different levels of Bloom’s taxonomy as per the outcome defined for the course.
Semester End Examination:
1. The SEE question paper will be set for 100 marks and the marks scored will be proportionately reduced to 50.
2. The question paper will have ten full questions carrying equal marks.
3. Each full question is for 20 marks. There will be two full questions (with a maximum of four sub-questions) from each module.
4. Each full question will have a sub-question covering all the topics under a module.
5. The students will have to answer five full questions, selecting one full question from each module
Suggested Learning Resources:
Text Books:
1.William Stallings: Cryptography And Network Security- Principles And Practice, 5th Edition, Pearson/PHI, 2011.
Reference books:
1. William Stallings, “Network Security Essentials (Applications and Standards)”, 4th Edition, Pearson Education. ,2012
2. Charlie Kaufman, Radia Perlman and Mike Speciner: “Network Security – Private Communication in a Public World”, 2nd Edition, Pearson/PHI, 2002.
3. Eric Maiwald: “Fundamentals of Network Security”, 1st Edition, Dreamtech Press, 2003.
4. Whitman: “Principles of Information Security”, 3rd Edition, Thomson, 2009.
5. Robert Bragg, Mark Rhodes: “Network Security: The complete reference”, 1st Edition, TMH, 2004.
6. Buchmann: “Introduction to Cryptography”, 2nd Edition, Springer, 2004.
Skill Development Activities Suggested
Course outcome (Course Skill Set)
At the end of the course the student will be able to :
CO1 Analyze and design classical encryption techniques and block ciphers L2
CO2 Understand and analyze data encryption standard. L2
CO3 Understand and analyze public-key cryptography, RSA and other public-key cryptosystems L2
CO4 Understand key management and distribution schemes and design User Authentication, such as Diffie-Hellman Key Exchange, ElGamal Cryptosystem, etc L2
CO5 Analyze and design hash and MAC algorithms, and digital signatures L2
Program Outcome of this course
1 Engineering knowledge: Apply the knowledge of mathematics, science, engineering fundamentals, and computer science and business systems to the solution of complex engineering and societal problems. PO1
2 Problem analysis: Identify, formulate, review research literature, and analyze complex engineering and business problems reaching substantiated conclusions using first principles of mathematics, natural sciences, and engineering sciences. PO2
3 Design/development of solutions: Design solutions for complex engineering problems and design system components or processes that meet the specified needs with appropriate consideration for the public health and safety, and the cultural, societal, and environmental considerations. PO3
4 Conduct investigations of complex problems: Use research-based knowledge and research methods including design of experiments, analysis and interpretation of data, and synthesis of the information to provide valid conclusions. PO4
5 Modern tool usage: Create, select, and apply appropriate techniques, resources, and modern engineering and IT tools including prediction and modeling to complex engineering activities with an understanding of the limitations PO5
6 The engineer and society: Apply reasoning informed by the contextual knowledge to assess societal, health, safety, legal and cultural issues and the consequent responsibilities relevant to the professional engineering and business practices. PO6
7 Environment and sustainability: Understand the impact of the professional engineering solutions in business societal and environmental contexts, and demonstrate the knowledge of, and need for sustainable development. PO7
8 Ethics: Apply ethical principles and commit to professional ethics and responsibilities and norms of the engineering and business practices. PO8
9 Individual and team work: Function effectively as an individual, and as a member or leader in diverse teams, and in multidisciplinary settings. PO9
10 Communication: Communicate effectively on complex engineering activities with the engineering community and with society at large, such as, being able to comprehend and write effective reports and design documentation, make effective presentations, and give and receive clear instructions. PO10
11 Project management and finance: Demonstrate knowledge and understanding of the engineering, business and management principles and apply these to one‟s own work, as a member and leader in a team, to manage projects and in multidisciplinary environments. PO11
12 Life-long learning: Recognize the need for, and have the preparation and ability to engage in independent and life-long learning in the broadest context of technological change. PO12