18001025661 / 8527794500
info@sgtuniversity.org

Syllabus | B. Tech. Electronics & Communication Engineering | Cryptography and network security

13040612 Cryptography and network security L T P C
Version1.0 Date of Approval: — 3 1 0 3
Pre-requisites//Exposure  
co-requisites  

Course Objectives

  1. Understand security concepts, Ethics in Network Security.
  2. Understand security threats, and the security services and mechanisms to counter them
  3. Comprehend and apply relevant cryptographic techniques
  4. Comprehend security services and mechanisms in the network protocol stack
  5. Comprehend and apply authentication services and mechanisms

Course Outcomes

On completion of this course, the students will be able to

Should be able to identify network security threats and determine efforts to counter them

1) Should be able to write code for relevant cryptographic algorithms.

2) Should be able to write a secure access client for access to a server

3) Should be able to send and receive secure mails

Catalog Description

Cryptography and network security  To study various aspects of Network Security Attacks, Services and Mechanisms.

Text Books

Cryptography and Network security, Atul Kahate, Tata McGraw-Hill Pub company Ltd., New Delhi

Reference Books

1) Network Security Private Communication in a public world, Charlie Kaufman, Radia Perlman & Mike Speciner, Prentice Hall of India Private Ltd., New Delhi

2) Network Security Essentials Applications and Standards, William Stallings, Pearson Education, New Delhi

3) Network Security: The Complete Reference by Roberta Bragg, Mark Phodes-Ousley, Keith Strassberg Tata Mcgraw-Hill

COURSE CONTENT

UNIT 1                                                                                                                12 Lecture hours

INTRODUCTION: The need for security-security approaches-principles of security-Plain Text and Cipher Text-substitution and Transposition Techniques-Encryption and Decryption-Symmetric and Asymmetric Cryptography-Stenography-key range and key size-types of attacks

UNIT 2                                                                                                                 8 Lecture hours

SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHMS: Algorithm types and modes-overview of symmetric key cryptography-DES-IDEA-RC5-BLOWFISH-AES-Differential and Linear Cryptanalysis.

UNIT 3                                                                                                              8 lecture hours

ASYMMETRIC KEY CRYPTOGRAPHIC ALGORITHMS: Overview of asymmetric key cryptography- RSA algorithm-symmetric and asymmetric key cryptography together-digital signatures-knapsack algorithm-some other algorithms.

PUBLIC KEY INFRASTRUCTURE: Introduction-Digital certificates- Private Key management-The PKIX model-Public Key Cryptography Standards- XML, PKI and Security

UNIT 4                                                                                                             6  lecture Hours

NETWORK SECURITY: Brief Introduction to TCP/IP- firewalls-IP security-Virtual Private Networkscase studies on cryptography and security.

Text Book:

  1. Cryptography and Network security, Atul Kahate, Tata McGraw-Hill Pub company Ltd., New Delhi

Reference Books:

1) Network Security Private Communication in a public world, Charlie Kaufman, Radia Perlman & Mike Speciner, Prentice Hall of India Private Ltd., New Delhi

2) Network Security Essentials Applications and Standards, William Stallings, Pearson Education, New Delhi

3) Network Security: The Complete Reference by Roberta Bragg, Mark Phodes-Ousley, Keith Strassberg Tata Mcgraw-Hill

Mode of Evaluation: The theory and lab performance of students are evaluated separately.

 

  Theory   Theory and laboratory
Components Internal SEE    
Marks 50 50    
Total Marks 100  
Scaled Marks 75   100
ADMISSIONS 2021