# ECE4013 CRYPTOGRAPHY-AND-NETWORK-SECURITY TH 1.2 47 ECE4013 (1)

```ECE4013
Pre-requisite
Cryptography and Network Security
ECE2005 Probability Theory and Random Process
L T P J C
3 0 0 0 3
Syllabus version
1.2
Course Objectives:
1. To acquaint students with the basic concepts in security mechanism, classical and
2. To teach students the significance of message authentication and digital signature in
cryptography.
3. To acquaint the students to the different types of network security and its significance.
Course Outcomes:
1. Comprehend and analyze OSI Security Architecture and Symmetric Key Encryption.
2. Comprehend the various mathematical techniques in cryptography, including number
theory, Finite Field, Modulo operator and Discrete Logarithm.
3. Able to analyse block ciphers, Data Encryption Standard (DES), Advanced Encryption
Standard (AES) and public key cryptography.
4. Able to analyse Diffie-Hellman key exchange, ElGamal Cryptosystem in asymmetric
key cryptosystem.
5. Comprehend the various types of data integrity and authentication schemes.
6. Comprehend the various network security mechanism
Student Learning Outcomes (SLO):
1,2,18
Module:1 Classical Encryption Techniques:
5 hours
Introduction, Security Services and Mechanisms, Classical Encryption Techniques
Module:2 Mathematical Foundations:
6 hours
Number Theory and Finite Fields, Principles of Pseudorandom Number Generation, Fermat’s and
Euler’s Theorems, The Chinese Remainder Theorem, Discrete Logarithms, Elliptic Curve
Arithmetic
Module:3 Symmetric Ciphers:
8 hours
Block Ciphers and encryption standards - DES, AES, Pseudorandom Number Generation, Stream
Ciphers, Public-Key Cryptography – RSA
Module:4 Asymmetric Ciphers:
6 hours
Diffie-Hellman Key Exchange, ElGamal Cryptosystem, Elliptic Curve Cryptography,
Pseudorandom Number Generation Based on an Asymmetric Cipher
Module:5 Data Integrity:
6 hours
Cryptographic Hash Functions, Message Authentication Codes
Module:6 Mutual Trust:
6 hours
Digital Signatures, Key Management and Distribution, User Authentication Protocols
Module:7 Network Security:
6 hours
Transport-Level Security, WLAN Security – Firewalls, Web Security, Software Security, IoT
threats, Security issue in Cognitive Networks, constraints and challenges
Module:8 Contemporary Issues
2 hours
Total lecture hours:
Text Book(s)
45 hours
1.
William Stallings, &quot;Cryptography and Network security: Principles and Practice&quot;, 5th Edition,
2014, Pearson Education, India.
Reference Books
1. Christof Paar and Jan Pelzl, “Understanding Cryptography – A Textbook for Students and
Practitioners”, Springer, 2014.
2. Behrouz A.Forouzan : Cryptography &amp; Network Security – The McGraw Hill Company,
2010.
Mode of evaluation: Internal Assessment (CAT, Quizzes, Digital Assignments) &amp; Final
Assessment Test (FAT)
Recommended by Board of Studies