MCA 405.2: Cryptography and Network Security
Lectures: 4 Periods/Week | Sessional Marks: 30 |
University Exam: 3 Hours | University Examination Marks: 70 |
UNIT-I
Introduction
Security trends, the OSI security architecture, security attacks, security services, security mechanisms, a model for network security.
Classical encryption techniques
Symmetric cipher model,Substitution techniques, Transposition techniques, Rotor machines, Steganography.
Block cipher and the data encryption standard
Blockcipher principles, the strength of DES, Differential and linear cryptanalysis, Block cipher design principles.
Confidentiality using Symmetric Encryption
Placement of encryption function, Traffic confidentiality, key distribution, random number generator.
UNIT-II
Public key cryptography and RSA
Principles of public key crypto systems, The RSA algorithm
Key management:Other public-key crypto systems
Key management, Diffie-Hellman key exchange.
Message authentication and hash functions:
Authentication requirements, Authentication functions, message authentication codes, Hash functions, security of hash functions and MACs.
Digital signatures and authentication protocols
Digital signatures, Authentication protocols, Digital Signature standard.
UNIT-III
Authentication Applications
Kerberos, X.509 authentication service
Email Security
Pretty good privacy, S/MIME
IP security
IP security overview, IP security architecture, Authentication header, Encapsulating security payload, combining security associations, key management.
Web security
Web security considerations, Secure Socket Layer and transport layer security, Secure electronic transaction.
UNIT-IV
Intruders
Intruders, Intrusion detection, password management
Malicious Software
Viruses and related threads, virus counter measures, distributed denial of service attacks.
Firewalls
Firewall Design principles, trusted systems, common criteria for information technology, security evaluation.
Text Books
- William Stallings, “Cryptography and Network Security”, Fourth edition, PHI. Chapters : 1,2,3,7,9,10,11,13,14,15,16,17,18,19,20.
- William Stallings, “Network Security Essentials – Applications and Standards”, Third Edition, Pearson Education (2007).
- Chris McNab, “Network Security Assessment”, 2nd Edition, OReilly (2007).
- Jon Erickson, “Hacking – The Art of Exploitation”, SPD, NOSTARCH Press (2006)
- Neal Krawety, “Introduction to Network Security”, Thomson (2007).
- Ankit Fadia, “Network Security – A Hackers Perspective”, Macmillan (2008)