Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
33 views1 page

CNS Syllabus

The document outlines a course on Cryptography and Network Security, covering various topics such as security attacks, cryptographic techniques, symmetric and asymmetric key ciphers, message authentication, and email security. It also discusses web security, intrusion detection, and firewall principles, along with case studies on cryptography. Key textbooks for the course include works by William Stallings and Atul Kahate.

Uploaded by

gaaykavin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views1 page

CNS Syllabus

The document outlines a course on Cryptography and Network Security, covering various topics such as security attacks, cryptographic techniques, symmetric and asymmetric key ciphers, message authentication, and email security. It also discusses web security, intrusion detection, and firewall principles, along with case studies on cryptography. Key textbooks for the course include works by William Stallings and Atul Kahate.

Uploaded by

gaaykavin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

(19A05601) CRYPTOGRAPHY & NETWORK SECURITY

UNIT — I
Attacks on Computers and Computer Security: Introduction, The need for security,
Security approaches, Principles of security, Types of Security attacks, Security services,
Security Mechanisms, A model for Network Security
Cryptography: Concepts and Techniques: Introduction, plain text and cipher text,
substitution techniques, transposition techniques, encryption and decryption, symmetric
and asymmetric key cryptography, steganography, key range and key size, possible types
of attacks.

UNIT — II
Symmetric key Ciphers: Block Cipher principles & Algorithms (DES, AES, Blowfish),
Differential and Linear Cryptanalysis, Block cipher modes of operation, Stream ciphers,
RC4,Location and placement of encryption function, Key distribution Asymmetric key
Ciphers: Principles of public key cryptosystems, Algorithms(RSA, Diffie-Hellman, ECC),
Key Distribution.

UNIT — III
Message Authentication Algorithms and Hash Functions: Authentication requirements,
Functions, Message authentication codes, Hash Functions, Secure hash algorithm,
Whirlpool, HMAC, CMAC, Digital signatures, knapsack algorithm Authentication
Applications: Kerberos, X.509 Authentication Service, Public — Key Infrastructure,
Biometric Authentication

UNIT — IV
E-Mail Security: Pretty Good Privacy, S/MIME IP Security: IP Security overview, IP
Security architecture, Authentication Header, Encapsulating security payload, Combining
security associations, key management

UNIT — V
Web Security: Web security considerations, Secure Socket Layer and Transport Layer
Security, Secure electronic transaction Intruders, Virus and Firewalls: Intruders,
Intrusion detection, password management, Virus and related threats, Countermeasures,
Firewall design principles, Types of firewalls Case Studies on Cryptography and security:
Secure Inter-branch Payment Transactions, Cross site Scripting Vulnerability, Virtual
Elections

TEXT BOOKS:
1. Cryptography and Network Security : William Stallings, Pearson Education,411i Edition
2. Cryptography and Network Security : Atul Kahate, Mc Graw Hill, 2" Edition

You might also like