UNIVERSITY OF MUMBAI
Syllabus for the T.Y. B. Sc. Sem. V & VI Program: T.Y.B.Sc. Subject: Information Technology
(with effect from the academic year 2012–2013)
Semester V
Paper 1: Network Security Paper 2: *ASP.NET with C# Paper 3: Software Testing Paper 4: *Advanced Java Paper 5: *Linux Administration
Semester VI
Paper 1: *Internet Technologies Paper 2: Digital Signals and Systems Paper 3: *Datawarehousing Paper 4: Elective: IPR and Cyber Laws Project Management GIS
Paper V: Project Report Paper VI: Project Viva-Voce
CLASS: B. Sc (Information technology) Paper I; SUBJECT: Network Security Periods per week Lecture 1 Period is 50 minutes TW/Tutorial/Practical Evaluation System Theory Examination TW/Tutorial/Practical
Semester – V 5 3 Hours 2 -Marks 60 40
Unit-I
Cryptography: Introduction: Some Simple Cryptosystems, The Shift Cipher, The Substitution Cipher, The Affine Cipher, The Vigenere Cipher, The Hill Cipher, The Permutation Cipher, Stream Ciphers, Cryptanalysis, Cryptanalysis of the Affine Cipher, Cryptanalysis of the Substitution Cipher, Cryptanalysis of the Vigenere Cipher, Cryptanalysis of the LFSR-based Stream Cipher. Shannon’s Theory, Perfect Secrecy, Entropy, Huffman Encodings and Entropy, Properties of Entropy, Spurious Keys and Unicity Distance The Data Encryption Standard, Description of DES, An Example of DES Encryption, The DES Controversy, DES in Practice, DES Modes of Operation, A Time-memory Trade-off, Differential Cryptanalysis, An Attack on a 3-round DES, An Attack on a 6-round DES. Introduction to Public-key Cryptography, More Number Theory, The Euclidean Algorithm, The Chinese Remainder Theorem, Other Useful Facts, The RSA Cryptosystem, Implementing RSA, Probabilistic Primality Testing, Attacks On RSA, The Decryption Exponent, Partial Information Concerning Plaintext Bits, The Rabin Cryptosystem, Factoring Algorithms, The p - 1 Method, Dixon’s Algorithm and the Quadratic Sieve,