Introduction to Cryptography
Introduction:
OSI Security Architecture, Security Attacks, Security Services, Security Mechanism, model for Network Security.
Classical Encryption Technique:
Symmetric Cipher Model, Substitution Techniques, Transposition Techniques.
Data Encryption and advanced encryption techniques
Block Ciphers, Data Encryption Standard and Advanced Encryption Standard
Block Cipher Principles, The Data Encryption Standard, Block Cipher Design Principles and Modes of operation, Evaluation Criteria for AES, AES Cipher-Encryption and Decryption, Data Structure, Encryption Round.
Public Key Cryptography and Key Management
Principles of Public Key Cryptosystem, RSA algorithm, Key management, Diffie Hellman Key exchange.
CRYPTOGRAPHY techniques
Message Authentication and Hash Function:
Authentication Requirement, Authentication Functions, Message Authentication Code, Hash Functions, Digital Signatures, Digital Signature Standard.
Authentication Applications:
Kerberos, X.509 Authentication Service
E-MAIL AND IP SECURITY
Electronic Mail Security:
Pretty Good Privacy (PGP), S/MIME
IP Security:
IP Security Overview;IP Security Architecture; Authentication Header; Encapsulating SecurityPayload; Combining Security Associations; Key Management.
WEB AND SYSTEM SECURITY
Web Security :
Web security Considerations; Secure Socket layer (SSL) and Transport layer Security (TLS); Secure Electronic Transaction (SET).
System Security :
Intruders, Intrusion Detection, Firewall Design Principles- Characteristics, Types of Firewall and Firewall Configuration.
Question paper pattern:
Text Books:
1. William Stallings, “Cryptography and Network Security – Principles and Practices”, 4th Edition, Pearson Education, 2009. (Chapters: 1, 2.1-2.3, 3.1,3.2,3.5, 5.1,5.2, 6.2, 9.1,9.2, 10.1,10.2, 11.1- 11.4, 13.1, 13.3, 14.1, 4.2, 15.1, 15.2, 16.1-16.6, 17.1-17.3, 18.1, 18.2, 20.1; Exclude the topic not mentioned in the syllabus)
Reference Books:
1. Behrouz A. Forouzan and DebdeepMukhopadhyay: “Cryptography and Network Security”, 2nd Edition, Tata McGraw-Hill, 2010.
2. AtulKahate, “Cryptography and Network Security” 2nd Edition TMH.