15.11.2014 Views

UNIVERSITY OF KERALA - Marian Engineering College

UNIVERSITY OF KERALA - Marian Engineering College

UNIVERSITY OF KERALA - Marian Engineering College

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

B.Tech Comp. Sc. & Engg., University of Kerala 77<br />

08.803 CRYPTOGRAPHY AND NETWORKS SECURITY 2 – 1 – 0<br />

Module I (14 hours)<br />

Symmetric Cipher Models- Substitution techniques- Transposition techniques- Rotor machines-<br />

Steganography- DES: Simplified DES- Block Cipher principals- The Data Encryption Standard. The Strength<br />

of DES- Differential and linear Cryptanalysis- Block Cipher Design principles- Block Cipher modes of<br />

operations- IDEA: Primitive operations- Key expansions- One round, Odd round, Even Round- Inverse keys<br />

for description.<br />

AES: Basic Structure- Primitive operation- Inverse Cipher- Key Expansion, Rounds, Inverse Rounds.<br />

Module II (13 hours)<br />

Public key Cryptography :- Principles of Public key Cryptography Systems, Number theory- Modular<br />

arithmetic, Prime numbers. RSA algorithms- Key Management - Diffie-Hellman Key Exchange, Elliptic<br />

curve cryptography- Authentication requirements- Authentication functions- Message authentication codes-<br />

Hash functions- SHA, MD5, Security of Hash functions and MACS- Digital signatures- Authentication<br />

protocols- Digital signature standards.<br />

Module III (12 hours)<br />

Network security: Electronic Mail Security: Pretty good privacy- S/MIME<br />

IP Security: Architecture- authentication Header- Encapsulating Security payload- Combining Security<br />

associations- Key management. Web Security: Web Security considerations- secure Socket Layer and<br />

Transport layer Security- Secure electronic transaction. Firewalls-Packet filters- Application Level Gateway-<br />

Encrypted tunnels.<br />

Text Books:<br />

1. Cryptography and Network Security – William Stallings, Pearson Education<br />

2. Cryptography and Network Security – Behrouz A. Forouzan, Tata McGraw-Hill.<br />

3. Applied Cryptography, Protocols, Algorithms, and Souce Code in C, 2 nd Edn – B. Schneier, Wiley.<br />

Reference Books:<br />

1. Network Security – Charlie Kaufman, Radia Perlman, Mike Speciner.<br />

Internal Continuous Assessment (Maximum Marks-50)<br />

25 Marks - Tests (minimum 2)<br />

15 Marks - Assignments (minimum 3) such as home work, problem solving, literature survey, seminar,<br />

term-project, software/hardware exercises, etc.<br />

10 Marks - Regularity in the class<br />

University Examination Pattern<br />

PART A: Short answer questions 10 x 4 marks=40 marks<br />

All questions are compulsory. There should be at least three questions<br />

from each module and not more than four questions from any module.<br />

PART B: Descriptive/Analytical/Problem solving questions 3 x 20 marks=60 marks<br />

Candidates have to answer one question out of two or two questions<br />

out of four from each module<br />

Maximum Total Marks: 100

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!