DEPARTMENT Course Code Computer Science and Engineering 22SCE151 Total Credits CourseTitle Teaching Learning Process 4 Course Type Professional Elective Course Cryptography and Network Security Credits Lecture Contact Hours 52 Tutorial Practical 0 0 0 0 4 Assessment in Weightage and marks CIE SEE Total Weightage 40 % 60 % 100 % Maximum 40 60 Marks 100 Marks Marks Marks Total 52 4 Minimum 20 25 marks 45 Marks Marks marks Note: *For passing the student has to score a minimum of 45 Marks (CIE+SEE: 20 + 25 or 21 + 24) COURSE PREREQUISITE: Computer Networks. COURSEOBJECTIVES: Sl. Course Objectives No. 1. Understand the key concepts of cryptography. 2. Comprehend various applications of cryptography 3. Analyze the different cryptographic algorithms to provide better security. COURSE OUTCOMES (COs) CO# CO1 CO2 CO3 CO4 CO5 Highest Level of CourseOutcomes Cognitive Domain Understand the concepts of cryptography L2 Understand and apply the concepts of public key cryptosystems and L3 hash functions Apply the concepts of authentication functions and key distribution L3 techniques. Analyze and implement protocols related to E-mail security and L4 web security Analyze the security issues at network layer and evaluate system L4 security mechanisms L1 – Remember, L2 – Understand, L3 – Apply, L4 – Analyze, L5 – Evaluate, L6 - Create Course Content / Syllabus: Hours UNIT Content No. Lecture 1. Overview of Cryptography: Introduction, Information security and 12 cryptography, Basic terminology and concepts, Symmetric key encryption , Digital signatures, Public-key cryptography, Hash functions, Protocols and mechanisms, Key establishment, management, and certification, Pseudorandom numbers and sequences, Classes of attacks and security models. 2. Public-Key Cryptography and Hash Functions: Public-Key 10 cryptography: Principles of Public-Key Cryptosystems, The RSA Algorithm, Diffie-Hellman Key Exchange, Elliptic curve cryptography. 16 3. 4. 5. Cryptographic Hash Functions: Applications of Cryptographic Hash Functions, Two simple hash functions, Secure Hash Algorithm (SHA). Authentication and Key Management: Message Authentication: Authentication Requirements, Authentication Functions, Requirements for Message Authentication Codes (MAC), Security of MACs, MAC based on Hash Function. Digital signature. User authentication: Remote user authentication principles, Remote user authentication using symmetric Encryption, Kerberos, Remote user authentication using Asymmetric Encryption. Symmetric key distribution using symmetric and asymmetric encryption. Distribution of public keys. Security at Application Layer and Transport Layer: Application Layer Security: Pretty Good Privacy (PGP), Multipurpose internet Mail extensions (MIME) and secured Multipurpose internet Mail extensions (S/MIME). Transport Layer Security: Web security considerations, Secure socket layer (SSL), Transport Layer security, HTTP Network Security and System security. IP Security: IP Security Overview, IP Security Policy, Encapsulation Security Payload, Wireless network security: wireless security, Mobile device security. System security: Buffer overflow and malicious software, Malicious programs, Intrusion detection systems, Firewalls. 10 10 10 Text Books: Sl. Author/s Title Publisher Details No. Alfred J. Menezes, Paul Handbook of Applied CRC Press, Reprint 2018. 1. C. van Oorschot and Cryptography Scott A. Vanstone 2. William Stallings Cryptography and Network 6thEdition, Pearson Security Education Inc Publishing as Prentice hall (PHI), 2016. Reference Books: Sl. Author/s No. 1. Behrouz A forouzan, debdeepMukhopadhyay 2. Charles P. Pfleeger, Shari Lawrence Pfleeger 3. Jonathan Katz, Yehuda Lindell 4. AtulKahate 5. Douglas R. Stinson Title Publisher Details Cryptography and Network 3rd edition, McGraw Hill security education, Revised 2020. Security in computing 3rd Edition, Prentice Hall of India, Revised 2016. Introduction to Modern 3rd Edition, CRC press Cryptography publications. 2007. Cryptography and Network 3rd Edition, McGraw Hill Security Education private Limited, 2013. Cryptography: Theory and 3rd Edition, Chapman and Practice Hall/CRC, 2006. 17 Web Resources: Sl. Web Links No. 1. https://onlinecourses.nptel.ac.in/noc21_cs16/preview 2. https://onlinecourses.nptel.ac.in/noc21_cs43/preview 3. https://doc.lagout.org/network/3_Cryptography/CRC%20Press%20%20Handbook%20of%20applied%20Cryptography.pdf Course Articulation: COURSE OUTCOMES CO1 CO2 CO3 CO4 CO5 PROGRAM OUTCOMES PO1 PO2 PO3 3 3 3 3 3 3 3 3 3 3 3 3 PO4 3 3 3 3 3 PO5 - PO6 - High – 3, Medium – 2, Low – 1 18