(TIT 701 ) CRYPTOGRAPHY AND NETWORK SECURITY
Introduction to security attacks, services and mechanism, introduction to cryptography.
Conventional Encryption: Conventional encryption model, classical encryption
techniques- substitution ciphers and transposition ciphers, cryptanalysis, stereography,
stream and block ciphers.
Modern Block Ciphers: Block ciphers principals, Shannon’s theory of confusion and
diffusion, fiestal structure, data encryption standard(DES), strength of DES, differential
and linear crypt analysis of DES, block cipher modes of operations, triple DES, IDEA
encryption and decryption, strength of IDEA, confidentiality using conventional
encryption, traffic confidentiality, key distribution, random number generation.
Introduction to graph, ring and field, prime and relative prime numbers, modular
arithmetic, Fermat’s and Euler’s theorem, primality testing, Euclid’s Algorithm, Chinese
Remainder theorem, discrete logarithms.
Principals of public key crypto systems, RSA algorithm, security of RSA, key
management, Diffle-Hellman key exchange algorithm, introductory idea of Elliptic curve
cryptography, Elganel encryption.
Message Authentication and Hash Function: Authentication requirements, authentication
functions, message authentication code, hash functions, birthday attacks, security of hash
functions and MACS, MD5 message digest algorithm, Secure hash algorithm(SHA).
Digital Signatures: Digital Signatures, authentication protocols, digital signature
standards (DSS), proof of digital signature algorithm.
Authentication Applications: Kerberos and X.509, directory authentication service,
electronic mail security-pretty good privacy (PGP), S/MIME.
IP Security: Architecture, Authentication header, Encapsulating security payloads,
combining security associations, key management.
Web Security: Secure socket layer and transport layer security, secure electronic
System Security: Intruders, Viruses and related threads, firewall design principals, trusted
1. William Stallings, “Cryptography and Network Security: Principals and
Practice”, Prentice Hall, New Jersy.
2. Johannes A. Buchmann, “Introduction to Cryptography”, Springer-Verlag.
3. Bruce Schiener, “Applied Cryptography”.
No responses found. Be the first to respond...