17MCA444 Cryptography and Network security syllabus for MCA



A d v e r t i s e m e n t

Module-1 Introduction to Cryptography 8 hours

Introduction to Cryptography

Introduction:

OSI Security Architecture, Security Attacks, Security Services, Security Mechanism, model for Network Security.

 

Classical Encryption Technique:

Symmetric Cipher Model, Substitution Techniques, Transposition Techniques.

Module-2 Data Encryption and advanced encryption techniques 8 hours

Data Encryption and advanced encryption techniques

Block Ciphers, Data Encryption Standard and Advanced Encryption Standard

Block Cipher Principles, The Data Encryption Standard, Block Cipher Design Principles and Modes of operation, Evaluation Criteria for AES, AES Cipher-Encryption and Decryption, Data Structure, Encryption Round.

 

Public Key Cryptography and Key Management

Principles of Public Key Cryptosystem, RSA algorithm, Key management, Diffie Hellman Key exchange.

Module-3 CRYPTOGRAPHY techniques 8 hours

CRYPTOGRAPHY techniques

Message Authentication and Hash Function:

Authentication Requirement, Authentication Functions, Message Authentication Code, Hash Functions, Digital Signatures, Digital Signature Standard.

 

Authentication Applications:

Kerberos, X.509 Authentication Service

Module-4 E-MAIL AND IP SECURITY 8 hours

E-MAIL AND IP SECURITY

Electronic Mail Security:

Pretty Good Privacy (PGP), S/MIME

 

IP Security:

IP Security Overview;IP Security Architecture; Authentication Header; Encapsulating SecurityPayload; Combining Security Associations; Key Management.

Module-5 WEB AND SYSTEM SECURITY 8 hours

WEB AND SYSTEM SECURITY

Web Security :

Web security Considerations; Secure Socket layer (SSL) and Transport layer Security (TLS); Secure Electronic Transaction (SET).

 

System Security :

Intruders, Intrusion Detection, Firewall Design Principles- Characteristics, Types of Firewall and Firewall Configuration.

 

Question paper pattern:

  • The question paper will have ten questions.
  • Each full question consists of 16 marks.
  • There will be 2full questions (with a maximum of four sub questions) from each module.
  • Each full question will have sub questions covering all the topics under a module.
  • The students will have to answer 5 full questions, selecting one full question from each module.

 

Text Books:

1. William Stallings, “Cryptography and Network Security – Principles and Practices”, 4th Edition, Pearson Education, 2009. (Chapters: 1, 2.1-2.3, 3.1,3.2,3.5, 5.1,5.2, 6.2, 9.1,9.2, 10.1,10.2, 11.1- 11.4, 13.1, 13.3, 14.1, 4.2, 15.1, 15.2, 16.1-16.6, 17.1-17.3, 18.1, 18.2, 20.1; Exclude the topic not mentioned in the syllabus)

 

Reference Books:

1. Behrouz A. Forouzan and DebdeepMukhopadhyay: “Cryptography and Network Security”, 2nd Edition, Tata McGraw-Hill, 2010.

2. AtulKahate, “Cryptography and Network Security” 2nd Edition TMH.

Last Updated: Tuesday, January 24, 2023