EC2035 CRYPTOGRAPHY AND NETWORK SECURITY SYLLABUS | ANNA UNIVERSITY BE ECE 7TH SEMESTER SYLLABUS REGULATION 2008 2011-2012 BELOW IS THE ANNA UNIVERSITY SEVENTH SEMESTER BE ELECTRONICS AND COMMUNICATION ENGINEERING DEPARTMENT SYLLABUS IT IS APPLICABLE FOR ALL STUDENTS ADMITTED IN THE YEAR 2011-2012 (ANNA UNIVERSITY CHENNAI,TRICHY,MADURAI,TIRUNELVELI,COIMBATORE), 2008 REGULATION OF ANNA UNIVERSITY CHENNAI AND STUDENTS ADMITTED IN ANNA UNIVERSITY CHENNAI DURING 2009
3 0 0 3
96
AIM
To understand the principles of encryption algorithms; conventional and public key
cryptography. To have a detailed knowledge about authentication, hash functions and
application level security mechanisms.
OBJECTIVES
To know the methods of conventional encryption.
To understand the concepts of public key encryption and number theory
To understand authentication and Hash functions.
To know the network security tools and applications.
To understand the system level security used.
UNIT I INTRODUCTION 10
OSI Security Architecture - Classical Encryption techniques – Cipher Principles – Data
Encryption Standard – Block Cipher Design Principles and Modes of Operation -
Evaluation criteria for AES – AES Cipher – Triple DES – Placement of Encryption
Function – Traffic Confidentiality
UNIT II PUBLIC KEY CRYPTOGRAPHY 10
Key Management - Diffie-Hellman key Exchange – Elliptic Curve Architecture and
Cryptography - Introduction to Number Theory – Confidentiality using Symmetric
Encryption – Public Key Cryptography and RSA.
UNIT III AUTHENTICATION AND HASH FUNCTION 9
Authentication requirements – Authentication functions – Message Authentication Codes
– Hash Functions – Security of Hash Functions and MACs – MD5 message Digest
algorithm - Secure Hash Algorithm – RIPEMD – HMAC Digital Signatures –
Authentication Protocols – Digital Signature Standard
UNIT IV NETWORK SECURITY 8
Authentication Applications: Kerberos – X.509 Authentication Service – Electronic Mail
Security – PGP – S/MIME - IP Security – Web Security.
UNIT V SYSTEM LEVEL SECURITY 8
Intrusion detection – password management – Viruses and related Threats – Virus
Counter measures – Firewall Design Principles – Trusted Systems.
TOTAL : 45 PERIODS
TEXT BOOKS
1. William Stallings, “Cryptography And Network Security – Principles and Practices”,
Pearson Education, Third Edition, 2003.
2. Behrouz A. Foruzan, “Cryptography and Network Security”, Tata McGraw-Hill, 2007
REFERENCES
1. Bruce Schneier, “Applied Cryptography”, John Wiley & Sons Inc, 2001.
97
2. Charles B. Pfleeger, Shari Lawrence Pfleeger, “Security in Computing”, Third Edition,
Pearson Education, 2003
3. Wade Trappe and Lawrence C. Washington , “ Introduction to Cryptography with
4. coding theory” , Pearson Education, 2007.
5. Wenbo Mao, “ Modern Cryptography Theory and Practice” , Pearson Education,
2007
6. Thomas Calabrese, “Information Security Intelligence : Cryptographic Principles and
Applications”, Thomson Delmar Learning,2006.
7. Atul Kahate, “Cryptography and Network Security”, Tata McGraw-Hill, 2003.
No comments:
Post a Comment
Any doubt ??? Just throw it Here...