School: School of Engineering and technology
Department Department of Computer Science and Engineering
Program: B. Tech
Branch:
1 Course Code CSE032
2 Course Title Cryptography and Network Security
3 Credits 3
4 Contact 3-0-0
Hours
(L-T-P)
Course Core
Status
5 Course The objective of this course is to provide an intention to explain basic
Objective concepts and algorithms of symmetric &asymmetric key cryptography,
including encryption/decryption and key exchange with the application
of cryptography and technique.
6 Course On successful completion of this module students will be able to:
Outcomes
CO1: Identify the basic concepts of computer security, algorithms of
symmetric Key cryptography, including encryption/decryption.
CO2: Apply the tools and methodologies used to perform mathematic
concepts behind the cryptographic algorithms..
CO3: Explain the tools and methodologies used to perform Security
analysis.
CO4: Interpret use of cryptographic data integrity algorithms and user
authentication protocols
CO5: Examine security at application layer, transport layer and network
layer.
CO6: Compare various algorithm of cryptography used for Network
Security.
7 Course This course will provide a deterministic approach of both the principles
Description and practice of cryptography & network security. It covers the basic
issues to be addressed by a network security capability, and explored by
providing a tutorial and survey of cryptography and network security
technology.
8 Outline syllabus CO
Mapping
Unit 1 Introduction& symmetric Key Cryptography
A Computer Security Concepts- OSI security Architecture, Security CO1
attacks, Services, mechanism, model of network security
B Classical encryption techniques- Substitution Cipher(Mono- CO1
alphabetic, Poly-alphabetic), Transposition cipher, Stegnography
C Block Cipher- Encryption Principles, DES and its variants, strength CO1
of DES
Unit 2 Mathematics of Cryptography
A Eucledian, Extended Eucledian Algorithm, EuilersTotient Function CO2
, Ferment little Theorem, Eulers theorem
B Primality Testing-Miller Rabin test, Chinese Remainder Theorem CO2, CO6
C Exponential- square and multiply method, Discrete Logarithm CO2, CO6
Unit 3 Asymmetric Cryptography & Key Exchange
A Public Key cryptography-RSA, Cryptanalysis of RSA CO3
B Elgamal cryptography, Elliptic Curve cryptography CO3, CO6
C Key Management and distribution : KDC, Diffie Hellman Key CO3, CO6
Exchange
Unit 4 Digital signatures
A User Authentication protocol- Kerberos CO4
B Digital Signature –RSA, Elgamal, DSS CO4
C Data integrity algorithms-Hash Functions, MD5, SHA-512 CO4
Unit 5 Security
A Security at Application layer-Email Architecture, S/MIME, PGP- CO5
Scenarios, key rings
B Security at Transport layer-SSL( Services, Protocols) CO5
C Security at Network layer-IPSec(Modes, Security Protocols-AH, CO6
ESP, Services provided by IPSEC)
Mode of Theory/Jury/Practical/Viva
examination
Weightage CA MTE ETE
Distribution 30% 20% 50%
Text book/s* 1. Atul Kahate , "Network Security ", Wiley India Pvt Ltd, 2010.
2. Michael T. Simpson, "Hands-on Cryptography & Network
Security & Network Defense", Course Technology, 2010.
3. Rajat Khare, "Network Seuciryt and Cryptography & Network
Security ", Luniver Press, 2006.
Other 1. Bruce Schneier, “Applied Cryptography”, John Wiley & Sons
Inc, 2001.
References 2. Behrouz A. Forouzan, “Cryptography And Network Security”-
McGraw Hill
1. Internet as a resource for reference.
CO and PO Mapping
S. Course Outcome Program Outcomes (PO) & Program
No. Specific Outcomes (PSO)
1. CO1: Identifybasic concepts of computer security, algorithms PO1, PO2, PSO1. PSO2
of symmetric Key cryptography, including
encryption/decryption.
2. CO2: Apply the tools and methodologies used to perform PO1,PO2,PO3, PO4, PSO1,PSO2
mathematic concepts behind the cryptographic algorithms..
3. CO3: Explain the tools and methodologies used to perform PO1, PO3, PO5, PSO1, PSO2
Security analysis.
4. CO4: Analyze and use cryptographic data integrity PO1, PO4, PO6, PO7, PSO1,PSO2
algorithms and user authentication protocols
5. CO5. Examine security at application layer, transport layer PO5,PO7, PO8, PO9, PSO1,PSO2
and network layer.
6. CO6: Compare various algorithm of cryptography used for PO10,PO11,PO12,PSO1,PSO3
Network Security.
PO and PSO mapping with level of strength for Course Name Cryptography and Network
Security (Course Code CSE032)
Code_ CO’ P PO2 P PO P P P P PO PO10 PO11 PO12 PSO PSO PSO3
Course s O O 4 O O O7 O 9 1 2
Name 1 3 5 6 8
-
CO1 3 2 - - - - - - - - 3 1 -
CSE03
2_Cryp
tograph CO2 2 3 2 1 - - - - - - - - 2 3 -
y and
Networ CO3 2 - 2 - 3 - - - - - - - 2 2 1
k 2
Securit CO4 2 - - 2 - 2 2 - - - - - 2
y CO5 - - - - 2 - 2 2 2 - - 1 - -
CO6 - - - - - - - - - 2 2 2 2 - 2
Average of non-zeros entry in following table (should be auto calculated).
P P P P PS PS
PO PO PO PO PO PS
Course Code Course Name PO1 PO2 PO 3 O O O O1 O O
4 5 8 9 10 O1
6 7 11 2 2 3
Cryptography
and Network
CSE032 Security y and 2.5 2.5 2 1.5 2.5 2 2 2 2 2 2 2 2 2 1.5
Network Security
Strength of Correlation
1. Addressed toSlight (Low=1) extent 2. Addressed toModerate (Medium=2) extent
3. Addressed toSubstantial (High=3) extent