IT1352 CRYPTOGRAPHY AND NETWORK SECURITY Syllabus - Anna University




IT1352 CRYPTOGRAPHY AND NETWORK SECURITY 3 1 0 100

AIM
To understand the principles of encryption algorithms; conventional and public key cryptography. To have a detailed knowledge about authentication, hash functions and application level security mechanisms.

OBJECTIVES
To know the methods of conventional encryption.
To understand the concepts of public key encryption and number theory
To understand authentication and Hash functions.
To know the network security tools and applications.
To understand the system level security used.

UNIT I INTRODUCTION 10
OSI Security Architecture - Classical Encryption techniques – Cipher Principles – Data Encryption Standard – Block Cipher Design Principles and Modes of Operation - Evaluation criteria for AES – AES Cipher – Triple DES – Placement of Encryption Function – Traffic Confidentiality

UNIT II PUBLIC KEY CRYPTOGRAPHY 10
Key Management - Diffie-Hellman key Exchange – Elliptic Curve Architecture and Cryptography - Introduction to Number Theory – Confidentiality using Symmetric Encryption – Public Key Cryptography and RSA.

UNIT III AUTHENTICATION AND HASH FUNCTION 9
Authentication requirements – Authentication functions – Message Authentication Codes – Hash Functions – Security of Hash Functions and MACs – MD5 message Digest algorithm - Secure Hash Algorithm – RIPEMD – HMAC Digital Signatures – Authentication Protocols – Digital Signature Standard
UNIT IV NETWORK SECURITY 8
Authentication Applications: Kerberos – X.509 Authentication Service – Electronic Mail Security – PGP – S/MIME - IP Security – Web Security.

UNIT V SYSTEM LEVEL SECURITY 8
Intrusion detection – password management – Viruses and related Threats – Virus Counter measures – Firewall Design Principles – Trusted Systems.

TUTORIAL 15
TOTAL : 60
TEXT BOOK
1. William Stallings, “Cryptography And Network Security – Principles and Practices”, Prentice Hall of India, Third Edition, 2003.

REFERENCES
1. Atul Kahate, “Cryptography and Network Security”, Tata McGraw-Hill, 2003.
2. Bruce Schneier, “Applied Cryptography”, John Wiley & Sons Inc, 2001.
3. Charles B. Pfleeger, Shari Lawrence Pfleeger, “Security in Computing”, Third Edition, Pearson Education, 2003.


Reference: www.annauniv.edu


Related Articles

Madras University IDE Syllabus

UG and PG Syllabus, Madras University IDE. Academic Year 2011-2012. please download the document to get the syllabus. all subject syllabus will be available in this section, BA Christian BA Criminology BA Economic BA English BA Historical BA PublicAdmns BA Tamil BBA BCA BCom Commerce BCom Computer BCom Corporate BLit Tamil BSc Geography BSc Maths BSc Psychology thanks

Important seminar topics in Mechanical Engineering

This resource lists the important seminar topics/subjects that can be taken as a part of curriculum/syllabus during engineering study in Mechanical branch. This list covers topics from different subjects and field like manufacturing, Industrial Engineering, Heat transfer, Power plant, Cryogenics engineering and automobile.

More articles: Syllabus 5

Comments

No responses found. Be the first to comment...


  • Do not include your name, "with regards" etc in the comment. Write detailed comment, relevant to the topic.
  • No HTML formatting and links to other web sites are allowed.
  • This is a strictly moderated site. Absolutely no spam allowed.
  • Name:
    Email: