CRYPTOGRAPHY AND NETWORK SECURITY
L T P M C
3 1 0 100 4
UNIT I INTRODUCTION 9+3
OSI Security Architecture - Classical Encryption techniques – Cipher Principles – Data
Encryption Standard – Block Cipher Design Principles and Modes of Operation -
Evaluation criteria for AES – AES Cipher – Triple DES – Placement of Encryption
Function – Traffic Confidentiality
UNIT II PUBLIC KEY CRYPTOGRAPHY 9+3
Key Management - Diffie-Hellman key Exchange – Elliptic Curve Architecture and
Cryptography - Introduction to Number Theory – Confidentiality using Symmetric
Encryption – Public Key Cryptography and RSA.
UNIT III AUTHENTICATION AND HASH FUNCTION 9+3
Authentication requirements – Authentication functions – Message Authentication
Codes – Hash Functions – Security of Hash Functions and MACs – MD5 message
Digest algorithm - Secure Hash Algorithm – RIPEMD – HMAC Digital Signatures –
Authentication Protocols – Digital Signature Standard
UNIT IV NETWORK SECURITY 9+3
Authentication Applications: Kerberos – X.509 Authentication Service – Electronic Mail
Security – PGP – S/MIME - IP Security – Web Security.
UNIT V SYSTEM LEVEL SECURITY 9+3
Intrusion detection – password management – Viruses and related Threats – Virus
Counter measures – Firewall Design Principles – Trusted Systems.
TEXT BOOKS
1. Behrouz A Forouzan , “Cryptography and Network Security”, Tata McGraw Hill
Education Pvt. Ltd., New Delhi, 2007.
2. Atul Kahate, ““Cryptography and Network Security”, Second Edition, Tata McGraw
Hill Education Pvt. Ltd., New Delhi, 2009
3. William Stallings, “Cryptography and Network Security, fourth edition, Prentice Hall,
New Delhi, 2006.
REFERENCE BOOKS
1. Bruce Schneier, “Applied Cryptography”, second edition, John Wiley & Sons, New
York, 1996.
2. Chris Brenton, “Mastering Network Security”, BPB Publication, New Delhi, 2002.
3. Steven L Shaffer, Alan R Simon, “Network Security”, AP Professional, New York,
2001.
SOFTWARE