Uploaded by tnagavi

22SCE151Cryptography and Network Security Syllabus

advertisement
DEPARTMENT
Course Code
Computer Science and Engineering
22SCE151
Total
Credits
CourseTitle
Teaching
Learning
Process
4
Course Type
Professional Elective Course
Cryptography and Network Security
Credits
Lecture
Contact
Hours
52
Tutorial
Practical
0
0
0
0
4
Assessment in
Weightage and marks
CIE
SEE
Total
Weightage
40 %
60 %
100 %
Maximum
40
60 Marks
100
Marks
Marks
Marks
Total
52
4
Minimum
20
25 marks
45 Marks
Marks
marks
Note: *For passing the student has to score a minimum of 45 Marks (CIE+SEE: 20 + 25 or 21 + 24)
COURSE PREREQUISITE: Computer Networks.
COURSEOBJECTIVES:
Sl.
Course Objectives
No.
1.
Understand the key concepts of cryptography.
2.
Comprehend various applications of cryptography
3.
Analyze the different cryptographic algorithms to provide better security.
COURSE OUTCOMES (COs)
CO#
CO1
CO2
CO3
CO4
CO5
Highest
Level of
CourseOutcomes
Cognitive
Domain
Understand the concepts of cryptography
L2
Understand and apply the concepts of public key cryptosystems and
L3
hash functions
Apply the concepts of authentication functions and key distribution
L3
techniques.
Analyze and implement protocols related to E-mail security and
L4
web security
Analyze the security issues at network layer and evaluate system
L4
security mechanisms
L1 – Remember, L2 – Understand, L3 – Apply, L4 – Analyze, L5 – Evaluate, L6 - Create
Course Content / Syllabus:
Hours
UNIT
Content
No.
Lecture
1.
Overview of Cryptography: Introduction, Information security and
12
cryptography, Basic terminology and concepts, Symmetric key
encryption , Digital signatures, Public-key cryptography, Hash
functions, Protocols and mechanisms, Key establishment, management,
and certification, Pseudorandom numbers and sequences, Classes of
attacks and security models.
2.
Public-Key Cryptography and Hash Functions: Public-Key
10
cryptography: Principles of Public-Key Cryptosystems, The RSA
Algorithm, Diffie-Hellman Key Exchange, Elliptic curve cryptography.
16
3.
4.
5.
Cryptographic Hash Functions: Applications of Cryptographic Hash
Functions, Two simple hash functions, Secure Hash Algorithm (SHA).
Authentication and Key Management: Message Authentication:
Authentication Requirements, Authentication Functions, Requirements
for Message Authentication Codes (MAC), Security of MACs, MAC
based on Hash Function. Digital signature. User authentication:
Remote user authentication principles, Remote user authentication using
symmetric Encryption, Kerberos, Remote user authentication using
Asymmetric Encryption. Symmetric key distribution using symmetric
and asymmetric encryption. Distribution of public keys.
Security at Application Layer and Transport Layer: Application
Layer Security: Pretty Good Privacy (PGP), Multipurpose internet Mail
extensions (MIME) and secured Multipurpose internet Mail extensions
(S/MIME). Transport Layer Security: Web security considerations,
Secure socket layer (SSL), Transport Layer security, HTTP
Network Security and System security. IP Security: IP Security
Overview, IP Security Policy, Encapsulation Security Payload, Wireless
network security: wireless security, Mobile device security. System
security: Buffer overflow and malicious software, Malicious programs,
Intrusion detection systems, Firewalls.
10
10
10
Text Books:
Sl.
Author/s
Title
Publisher Details
No.
Alfred J. Menezes, Paul Handbook of Applied CRC Press, Reprint 2018.
1.
C. van Oorschot and Cryptography
Scott A. Vanstone
2.
William Stallings
Cryptography and Network 6thEdition,
Pearson
Security
Education Inc Publishing as
Prentice hall (PHI), 2016.
Reference Books:
Sl.
Author/s
No.
1.
Behrouz A forouzan,
debdeepMukhopadhyay
2.
Charles P. Pfleeger,
Shari
Lawrence
Pfleeger
3.
Jonathan Katz, Yehuda
Lindell
4.
AtulKahate
5.
Douglas R. Stinson
Title
Publisher Details
Cryptography and Network 3rd edition, McGraw Hill
security
education, Revised 2020.
Security in computing
3rd Edition, Prentice Hall of
India, Revised 2016.
Introduction to Modern 3rd Edition, CRC press
Cryptography
publications. 2007.
Cryptography and Network 3rd Edition, McGraw Hill
Security
Education private Limited,
2013.
Cryptography: Theory and 3rd Edition, Chapman and
Practice
Hall/CRC, 2006.
17
Web Resources:
Sl.
Web Links
No.
1.
https://onlinecourses.nptel.ac.in/noc21_cs16/preview
2.
https://onlinecourses.nptel.ac.in/noc21_cs43/preview
3.
https://doc.lagout.org/network/3_Cryptography/CRC%20Press%20%20Handbook%20of%20applied%20Cryptography.pdf
Course Articulation:
COURSE
OUTCOMES
CO1
CO2
CO3
CO4
CO5
PROGRAM OUTCOMES
PO1
PO2
PO3
3
3
3
3
3
3
3
3
3
3
3
3
PO4
3
3
3
3
3
PO5
-
PO6
-
High – 3, Medium – 2, Low – 1
18
Download