CS8792 Cryptography and Network Security Anna University Syllabus Regulation 17

MG8591 Principles of Management Anna University Syllabus Regulation 17

CS8792              CRYPTOGRAPHY AND NETWORK SECURITY                  L T P C 3 0 0 3  


OBJECTIVES:  To understand Cryptography Theories, Algorithms and Systems.  To understand  necessary Approaches and Techniques to build protection mechanisms in order to secure computer networks.

UNIT I            INTRODUCTION                                                                                                  9 Security trends - Legal, Ethical and Professional Aspects of Security, Need for Security at Multiple levels, Security Policies - Model of network security – Security attacks, services and mechanisms – OSI security architecture – Classical encryption techniques: substitution techniques, transposition techniques, steganography- Foundations of modern cryptography: perfect security – information theory – product cryptosystem – cryptanalysis.

UNIT II           SYMMETRIC KEY CRYPTOGRAPHY                                                             9 MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures - Modular arithmetic-Euclid‟s algorithm- Congruence and matrices -  Groups, Rings, Fields- Finite fields- SYMMETRIC KEY CIPHERS: SDES – Block cipher Principles of DES – Strength of DES – Differential and linear cryptanalysis - Block cipher design principles – Block cipher mode of operation – Evaluation criteria for AES – Advanced Encryption Standard - RC4 – Key distribution.


UNIT III          PUBLIC KEY CRYPTOGRAPHY                                                                       9 MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing – Factorization – Euler‘s totient function, Fermat‘s and Euler‘s Theorem - Chinese Remainder Theorem – Exponentiation and logarithm - ASYMMETRIC KEY CIPHERS: RSA cryptosystem – Key distribution – Key management – Diffie Hellman key exchange - ElGamal cryptosystem – Elliptic curve arithmetic-Elliptic curve cryptography.

UNIT IV         MESSAGE AUTHENTICATION AND INTEGRITY                                          9 Authentication requirement – Authentication function – MAC – Hash function – Security of hash function and MAC – SHA –Digital signature and authentication protocols – DSS- Entity Authentication: Biometrics, Passwords, Challenge Response protocols- Authentication applications - Kerberos, X.509

UNIT V          SECURITY PRACTICE AND SYSTEM SECURITY                                           9 Electronic Mail security – PGP, S/MIME – IP security – Web Security - SYSTEM SECURITY: Intruders – Malicious software – viruses – Firewalls. 

TOTAL  45  PERIODS 

OUTCOMES: At the end of the course, the student should be able to:  Understand the fundamentals of networks security, security architecture, threats and vulnerabilities  Apply the different cryptographic operations of symmetric cryptographic algorithms  Apply the different cryptographic operations of public key cryptography  Apply the various Authentication schemes to simulate different applications.  Understand various Security practices and System security standards

TEXT BOOK: 1.  William Stallings, Cryptography and Network Security: Principles and Practice, PHI 3rd Edition, 2006.

REFERENCES: 
1.  C K Shyamala, N Harini and Dr. T R Padmanabhan: Cryptography and Network Security, Wiley India Pvt.Ltd
2.  BehrouzA.Foruzan, Cryptography and Network Security, Tata McGraw Hill 2007.
3.  Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: PRIVATE Communication in a PUBLIC World, Prentice Hall, ISBN 0-13-046019-2

Do You want International Scholarship? To Know more about the scholarship : Click Here

Are you a fresher and looking for Job? To know more about the Job Openings: Click Here


Click to Download Other ECE Materials: CLICK HERE

Click to Download Other CSE Materials: CLICK HERE


Click to Download MECH Materials: CLICK HERE

Other Syllabus


Comments