ECE4013 Pre-requisite Cryptography and Network Security ECE2005 Probability Theory and Random Process L T P J C 3 0 0 0 3 Syllabus version 1.2 Course Objectives: 1. To acquaint students with the basic concepts in security mechanism, classical and traditional Encryption techniques. 2. To teach students the significance of message authentication and digital signature in cryptography. 3. To acquaint the students to the different types of network security and its significance. Course Outcomes: 1. Comprehend and analyze OSI Security Architecture and Symmetric Key Encryption. 2. Comprehend the various mathematical techniques in cryptography, including number theory, Finite Field, Modulo operator and Discrete Logarithm. 3. Able to analyse block ciphers, Data Encryption Standard (DES), Advanced Encryption Standard (AES) and public key cryptography. 4. Able to analyse Diffie-Hellman key exchange, ElGamal Cryptosystem in asymmetric key cryptosystem. 5. Comprehend the various types of data integrity and authentication schemes. 6. Comprehend the various network security mechanism Student Learning Outcomes (SLO): 1,2,18 Module:1 Classical Encryption Techniques: 5 hours Introduction, Security Services and Mechanisms, Classical Encryption Techniques Module:2 Mathematical Foundations: 6 hours Number Theory and Finite Fields, Principles of Pseudorandom Number Generation, Fermat’s and Euler’s Theorems, The Chinese Remainder Theorem, Discrete Logarithms, Elliptic Curve Arithmetic Module:3 Symmetric Ciphers: 8 hours Block Ciphers and encryption standards - DES, AES, Pseudorandom Number Generation, Stream Ciphers, Public-Key Cryptography – RSA Module:4 Asymmetric Ciphers: 6 hours Diffie-Hellman Key Exchange, ElGamal Cryptosystem, Elliptic Curve Cryptography, Pseudorandom Number Generation Based on an Asymmetric Cipher Module:5 Data Integrity: 6 hours Cryptographic Hash Functions, Message Authentication Codes Module:6 Mutual Trust: 6 hours Digital Signatures, Key Management and Distribution, User Authentication Protocols Module:7 Network Security: 6 hours Transport-Level Security, WLAN Security – Firewalls, Web Security, Software Security, IoT threats, Security issue in Cognitive Networks, constraints and challenges Module:8 Contemporary Issues 2 hours Total lecture hours: Text Book(s) 45 hours 1. William Stallings, "Cryptography and Network security: Principles and Practice", 5th Edition, 2014, Pearson Education, India. Reference Books 1. Christof Paar and Jan Pelzl, “Understanding Cryptography – A Textbook for Students and Practitioners”, Springer, 2014. 2. Behrouz A.Forouzan : Cryptography & Network Security – The McGraw Hill Company, 2010. Mode of evaluation: Internal Assessment (CAT, Quizzes, Digital Assignments) & Final Assessment Test (FAT) Recommended by Board of Studies Approved by Academic Council 28-02-2016 No.47 Date 05-10-2017