OBJECTIVES:
- To understand Cryptography Theories, Algorithms and Systems.
- To understand necessary Approaches and Techniques to build protection mechanisms in order to secure computer networks.
UNIT I INTRODUCTION
Security trends - Legal, Ethical and Professional Aspects of Security, Need for Security at
Multiple levels, Security Policies - Model of network security – Security attacks, services and
mechanisms – OSI security architecture – Classical encryption techniques: substitution
techniques, transposition techniques, steganography- Foundations of modern cryptography:
perfect security – information theory – product cryptosystem – cryptanalysis.
UNIT II SYMMETRIC KEY CRYPTOGRAPHY
MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY:
Algebraic structures - Modular
arithmetic-Euclid‟s algorithm- Congruence and matrices - Groups, Rings, Fields- Finite
fields- SYMMETRIC KEY CIPHERS: SDES – Block cipher Principles of DES – Strength of
DES – Differential and linear cryptanalysis - Block cipher design principles – Block cipher
mode of operation – Evaluation criteria for AES – Advanced Encryption Standard - RC4 –
Key distribution.
UNIT III PUBLIC KEY CRYPTOGRAPHY
MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY:
Primes – Primality Testing –
Factorization – Euler‘s totient function, Fermat‘s and Euler‘s Theorem - Chinese Remainder
Theorem – Exponentiation and logarithm - ASYMMETRIC KEY CIPHERS: RSA
cryptosystem – Key distribution – Key management – Diffie Hellman key exchange -
ElGamal cryptosystem – Elliptic curve arithmetic-Elliptic curve cryptography.
UNIT IV MESSAGE AUTHENTICATION AND INTEGRITY
Authentication requirement – Authentication function – MAC – Hash function – Security of
hash function and MAC – SHA –Digital signature and authentication protocols – DSS- Entity
Authentication: Biometrics, Passwords, Challenge Response protocols- Authentication
applications - Kerberos, X.509
UNIT V SECURITY PRACTICE AND SYSTEM SECURITY
Electronic Mail security – PGP, S/MIME – IP security – Web Security - SYSTEM
SECURITY: Intruders – Malicious software – viruses – Firewalls.
OUTCOMES:
At the end of the course, the student should be able to:
- Understand the fundamentals of networks security, security architecture, threats and vulnerabilities
- Apply the different cryptographic operations of symmetric cryptographic algorithms
- Apply the different cryptographic operations of public key cryptography
- Apply the various Authentication schemes to simulate different applications.
- Understand various Security practices and System security standards
No comments:
Post a Comment