EC2035 CRYPTOGRAPHY AND NETWORK SECURITY L T P C
3 0 0 3
UNIT I INTRODUCTION 10
OSI Security Architecture - Classical Encryption techniques – Cipher Principles – Data
Encryption Standard – Block Cipher Design Principles and Modes of Operation -
Evaluation criteria for AES – AES Cipher – Triple DES – Placement of Encryption
Function – Traffic Confidentiality
UNIT II PUBLIC KEY CRYPTOGRAPHY 10
Key Management - Diffie-Hellman key Exchange – Elliptic Curve Architecture and
Cryptography - Introduction to Number Theory – Confidentiality using Symmetric
Encryption – Public Key Cryptography and RSA.
UNIT III AUTHENTICATION AND HASH FUNCTION 9
Authentication requirements – Authentication functions – Message Authentication Codes
– Hash Functions – Security of Hash Functions and MACs – MD5 message Digest
algorithm - Secure Hash Algorithm – RIPEMD – HMAC Digital Signatures –
Authentication Protocols – Digital Signature Standard
UNIT IV NETWORK SECURITY 8
Authentication Applications: Kerberos – X.509 Authentication Service – Electronic Mail
Security – PGP – S/MIME - IP Security – Web Security.
UNIT V SYSTEM LEVEL SECURITY 8
Intrusion detection – password management – Viruses and related Threats – Virus
Counter measures – Firewall Design Principles – Trusted Systems
TOTAL= 45 PERIODS
TEXT BOOKS
.1. William Stallings, “Cryptography And Network Security – Principles and Practices”,
Pearson Education, Third Edition, 2003.
2. Behrouz A. Foruzan, “Cryptography and Network Security”, Tata McGraw-Hill, 2007
REFERENCES
1. Bruce Schneier, “Applied Cryptography”, John Wiley & Sons Inc, 2001.
2. Charles B. Pfleeger, Shari Lawrence Pfleeger, “Security in Computing”, Third Edition,
Pearson Education, 2003
3. Wade Trappe and Lawrence C. Washington , “ Introduction to Cryptography with
coding theory” , Pearson Education, 2007.
4. Wenbo Mao, “ Modern Cryptography Theory and Practice” , Pearson Education ,
2007
5. Thomas Calabrese, “Information Security Intelligence : Cryptographic Principles and
Applications”, Thomson Delmar Learning,2006.
6. Atul Kahate, “Cryptography and Network Security”, Tata McGraw-Hill, 2003.
1 comments: until now.
Thanks....Very Useful one...................We are specialized Comprehensive Coverage of System and Network Security in Hyderabad. We offer managed safety options like firewall, Routers, and Switches.
System and network security in Hyderabad
Post a Comment