B.Tech. IV (CO) Semester - 7 |
L |
T |
P |
C |
CO403 : CRYPTOGRAPHY AND NETWORK SECURITY (CS-II) |
3 |
1 |
2 |
5 |
COURSE OBJECTIVES |
- Introduce students to the concepts, technologies, practices and challenges associated with Information Security and Privacy.
- Introduce the principles and practice of cryptography and network security.
- Examine schemes in different standards, and evaluate their use in different situations.
|
COURSE OUTCOMES |
After successful completion of this course, student will be able to
- Understand the concepts related to the basics of cryptography and computer security.
- Deduce the mechanisms to be employed while trying to satisfy any of the security services
- Apply the concept of security services and mechanisms from the application developers and network administrator’s perspective.
|
COURSE CONTENT |
INTRODUCTION AND OVERVIEW |
(02 Hours) |
ELEMENTARY NUMBER THEORY |
(04 Hours) |
Finite fields, Arithmetic and algebraic algorithms |
PSEUDO RANDOM BIT GENERATORS |
(02 Hours) |
FORMAL DEFINITION OF SECURE ENCRYPTION |
(04 Hours) |
Perfect secrecy, Semantic security, IND-CPA, IND-CCA |
STREAM CIPHERS |
(04 Hours) |
One time pad, Security proof of one time pad |
BLOCK CIPHERS |
(04 Hours) |
Need for block ciphers, Luby-rackoff construction and its security proof, Modes of operation |
HASH AND MAC FUNCTIONS |
(04 Hours) |
Definitions, Notions of security and unaffordability (EUF-CMA), Merkle-Damgard family of hash functions |
HARD PROBLEMS |
(04 Hours) |
Discrete logarithm, Factorization |
PUBLIC KEY CRYPTO SYSTEMS |
(06 Hours) |
Diffie Hellman, RSA encryption; Proofs of security under hardness assumptions, Digital Signature |
NETWORK SECURITY |
(03 Hours) |
IDENTITY MANAGEMENT |
(03 Hours) |
ADVANCED TOPICS |
(02 Hours) |
(Total Contact Time: 42 Hours + 14 Hours = 56 Hours) |
PRACTICALS |
- Implementation of Client side scripting
- Implementation of Server side scripting
- Implementation of mini project using above technology including the database connectivity
|
BOOKS RECOMMENDED |
- Dhiren Patel, Information Security: Theory and Practice, PHI, 2008/2010
- William Stallings, "Cryptography and Network Security - Principles and Practice", 6/E, Pearson Education, 2013.
- Douglas Stinson: "Cryptography: Theory and Practice, Third Edition", 3/E, Chapman and Hall/CRC, 2005
- Menezes Bernard, Network Security and Cryptography, Cengage Learning India, 2010
- Alfred. J. Menezes, Paul C. van Oorschot, Scott A. Vanstone: "Handbook of Applied Cryptography", 1/E, CRC, 1996
|