EC2035 CRYPTOGRAPHY AND NETWORK SECURITY

EC2035 CRYPTOGRAPHY AND NETWORK SECURITY L T P C
3 0 0 3
UNIT I INTRODUCTION 10
OSI Security Architecture - Classical Encryption techniques – Cipher Principles – Data
Encryption Standard – Block Cipher Design Principles and Modes of Operation -
Evaluation criteria for AES – AES Cipher – Triple DES – Placement of Encryption
Function – Traffic Confidentiality
UNIT II PUBLIC KEY CRYPTOGRAPHY 10
Key Management - Diffie-Hellman key Exchange – Elliptic Curve Architecture and
Cryptography - Introduction to Number Theory – Confidentiality using Symmetric
Encryption – Public Key Cryptography and RSA.
UNIT III AUTHENTICATION AND HASH FUNCTION 9
Authentication requirements – Authentication functions – Message Authentication Codes
– Hash Functions – Security of Hash Functions and MACs – MD5 message Digest

algorithm - Secure Hash Algorithm – RIPEMD – HMAC Digital Signatures –
Authentication Protocols – Digital Signature Standard
UNIT IV NETWORK SECURITY 8
Authentication Applications: Kerberos – X.509 Authentication Service – Electronic Mail
Security – PGP – S/MIME - IP Security – Web Security.
UNIT V SYSTEM LEVEL SECURITY 8
Intrusion detection – password management – Viruses and related Threats – Virus
Counter measures – Firewall Design Principles – Trusted Systems
TOTAL= 45 PERIODS
TEXT BOOKS
.
1. William Stallings, “Cryptography And Network Security – Principles and Practices”,
Pearson Education, Third Edition, 2003.
2. Behrouz A. Foruzan, “Cryptography and Network Security”, Tata McGraw-Hill, 2007
REFERENCES
1. Bruce Schneier, “Applied Cryptography”, John Wiley & Sons Inc, 2001.
2. Charles B. Pfleeger, Shari Lawrence Pfleeger, “Security in Computing”, Third Edition,
Pearson Education, 2003
3. Wade Trappe and Lawrence C. Washington , “ Introduction to Cryptography with
coding theory” , Pearson Education, 2007.
4. Wenbo Mao, “ Modern Cryptography Theory and Practice” , Pearson Education ,
2007
5. Thomas Calabrese, “Information Security Intelligence : Cryptographic Principles and
Applications”, Thomson Delmar Learning,2006.
6. Atul Kahate, “Cryptography and Network Security”, Tata McGraw-Hill, 2003.
Previous
Next Post »