ANNA UNIVERSITY CRYPTOGRAPHY AND NETWORK SECURITY CS8792 SYLLABUS REGULATION 2017 - Anna University Syllabus

Thursday, November 5, 2020

ANNA UNIVERSITY CRYPTOGRAPHY AND NETWORK SECURITY CS8792 SYLLABUS REGULATION 2017

OBJECTIVES: 
  • To understand Cryptography Theories, Algorithms and Systems. 
  • To understand necessary Approaches and Techniques to build protection mechanisms in order to secure computer networks. 
ANNA UNIVERSITY CRYPTOGRAPHY AND NETWORK SECURITY CS8792 SYLLABUS REGULATION 2017


UNIT I INTRODUCTION
 
Security trends - Legal, Ethical and Professional Aspects of Security, Need for Security at Multiple levels, Security Policies - Model of network security – Security attacks, services and mechanisms – OSI security architecture – Classical encryption techniques: substitution techniques, transposition techniques, steganography- Foundations of modern cryptography: perfect security – information theory – product cryptosystem – cryptanalysis. 

UNIT II SYMMETRIC KEY CRYPTOGRAPHY MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: 

Algebraic structures - Modular arithmetic-Euclid‟s algorithm- Congruence and matrices - Groups, Rings, Fields- Finite fields- SYMMETRIC KEY CIPHERS: SDES – Block cipher Principles of DES – Strength of DES – Differential and linear cryptanalysis - Block cipher design principles – Block cipher mode of operation – Evaluation criteria for AES – Advanced Encryption Standard - RC4 – Key distribution. 

UNIT III PUBLIC KEY CRYPTOGRAPHY MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: 

Primes – Primality Testing – Factorization – Euler‘s totient function, Fermat‘s and Euler‘s Theorem - Chinese Remainder Theorem – Exponentiation and logarithm - ASYMMETRIC KEY CIPHERS: RSA cryptosystem – Key distribution – Key management – Diffie Hellman key exchange - ElGamal cryptosystem – Elliptic curve arithmetic-Elliptic curve cryptography. 

UNIT IV MESSAGE AUTHENTICATION AND INTEGRITY 

Authentication requirement – Authentication function – MAC – Hash function – Security of hash function and MAC – SHA –Digital signature and authentication protocols – DSS- Entity Authentication: Biometrics, Passwords, Challenge Response protocols- Authentication applications - Kerberos, X.509 

UNIT V SECURITY PRACTICE AND SYSTEM SECURITY 

Electronic Mail security – PGP, S/MIME – IP security – Web Security - SYSTEM SECURITY: Intruders – Malicious software – viruses – Firewalls. 

OUTCOMES

At the end of the course, the student should be able to: 
  • Understand the fundamentals of networks security, security architecture, threats and vulnerabilities 
  • Apply the different cryptographic operations of symmetric cryptographic algorithms 
  • Apply the different cryptographic operations of public key cryptography 
  • Apply the various Authentication schemes to simulate different applications. 
  • Understand various Security practices and System security standards

No comments:

Post a Comment