Subject Details
Dept     : CS-CYBER SECURITY
Sem      : 3
Regul    : 2024
Faculty : Dr. R.Suganya
phone  : 8825587189
E-mail  : suganya.r.cbs.@drsrsnsrcas.ac.in
29
Page views
2
Files
2
Videos
0
R.Links

Icon
Syllabus

UNIT
1
The Basics of Cryptography

Encryption and decryption-What is cryptography? –Conventional cryptography -Public key cryptography- How PGP works - Keys- Digital signatures - Digital certificates- Validity and trust - Certificate Revocation - What is a passphrase? - Key splitting - Technical details

UNIT
2
Security Trends

The OSI Security Architecture– Security Attacks – Security Services – Security Mechanisms – A Model for Network Security - Classical Encryption Techniques– Symmetric Cipher Model – Substitution Techniques - Transposition Techniques – Rotor Machines - Steganography

UNIT
3
Block Ciphers and Data Encryption Standard

Block Cipher Principles – The Data Encryption Standard - The Strength of DES –Advanced Encryption Standard (AES) – Evaluation Criteria for AES – The AES Cipher – Multiple Encryption and Triple DES – Block Cipher Modes of Operation – Stream Ciphers and RC4- modular Arithmetic and Euclidean Algorithm

UNIT
4
Confidentiality Using Symmetric Encryption

Placement of Encryption Function – Traffic Confidentiality – Key Distribution – Public key Cryptography and RSA– Principles of Public Key Cryptosystems – The RSA Algorithm- Basic prime numbers and Discrete Logarithms -Key Management – Diffie Hellman Key Exchange.

UNIT
5
Message Authentication And Hash Functions

Authentication Functions – Message Authentication Codes (MAC’s) Functions– Security of Hash Functions and MAC’s Digital Signatures and Authentication Protocols – Digital Signatures – Digital Signature Standard.

Reference Book:

REFERENCE(S) 1. William Stallings. (2014). Cryptography and Network Security Principles and Practices. 6 thedition. Pearson Education. New Delhi. 2. John F. Dooley.(2012). History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms. Springer. 3. Charlie Kaufman, Radia Perlman, & Mike Speciner. (2017). Network Security Private Communication in a Public World. 2 ndedition. Prentice-Hall of India. New Delhi

Text Book:

TEXT(S) 1. An Introduction to Cryptography, version 8.0. Released Oct. 2002. 2. AtulKahate. (2019). Cryptography and Network Security. 4thedition.Tata McGraw Hill. New Delhi.

 

Print    Download