CS8792 CRYPTOGRAPHY AND NETWORK SECURITY NOTES 2017 REGULATION

In this post we have posted some notes on CS8792 CRYPTOGRAPHY AND NETWORK SECURITY of PROFESSIONAL CORE for ANNA UNIVERSITY AFFILIATED COLLEGES STUDENTS.
Here We have listed the the notes whichever we could collect for CS8792 CRYPTOGRAPHY AND NETWORK SECURITY subject, We think that it will be helpful for your exam preparation.

OBJECTIVES:

π To understand Cryptography Theories, Algorithms and Systems.
π To understand necessary Approaches and Techniques to build protection
mechanisms in order to secure computer networks.

UNIT I INTRODUCTION

Security trends – Legal, Ethical and Professional Aspects of Security, Need for Security at Multiple levels, Security Policies – Model of network security β Security attacks, services and mechanisms β OSI security architecture β Classical encryption techniques: substitution techniques, transposition techniques, steganography- Foundations of modern cryptography: perfect security β information theory β product cryptosystem β cryptanalysis.

UNIT II SYMMETRIC KEY CRYPTOGRAPHY MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY:

Algebraic structures – Modular arithmetic-Euclidβs algorithm- Congruence and matrices – Groups, Rings, Fields- Finite  fields- SYMMETRIC KEY CIPHERS: SDES β Block cipher Principles of DES β Strength of  DES β Differential and linear cryptanalysis – Block cipher design principles β Block cipher mode of operation β Evaluation criteria for AES β Advanced Encryption Standard – RC4 β Key distribution.

UNIT III PUBLIC KEY CRYPTOGRAPHY MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY:

Primes β Primality Testing β Factorization β Eulerβs totient function, Fermatβs and Eulerβs Theorem – Chinese Remainder Theorem β Exponentiation and logarithm – ASYMMETRIC KEY CIPHERS: RSA cryptosystem β Key distribution β Key management β Diffie Hellman key exchange – ElGamal cryptosystem β Elliptic curve arithmetic-Elliptic curve cryptography.

UNIT IV MESSAGE AUTHENTICATION AND INTEGRITY

Authentication requirement β Authentication function β MAC β Hash function β Security of hash function and MAC β SHA βDigital signature and authentication protocols β DSS- Entity Authentication: Biometrics, Passwords, Challenge Response protocols- Authentication applications – Kerberos, X.509

UNIT V SECURITY PRACTICE AND SYSTEM SECURITY

Electronic Mail security β PGP, S/MIME β IP security β Web Security – SYSTEM SECURITY: Intruders β Malicious software β viruses β Firewalls.

OUTCOMES:

At the end of the course, the student should be able to:
π Understand the fundamentals of networks security, security architecture, threats and vulnerabilities
π Apply the different cryptographic operations of symmetric cryptographic algorithms
π Apply the different cryptographic operations of public key cryptography
π Apply the various Authentication schemes to simulate different applications.
π Understand various Security practices and System security standards .

TEXT BOOK:

1. William Stallings, Cryptography and Network Security: Principles and Practice, PHI 3rd Edition, 2006.

REFERENCES:

1. C K Shyamala, N Harini and Dr. T R Padmanabhan: Cryptography and Network
Security, Wiley India Pvt.Ltd .
2. BehrouzA.Foruzan, Cryptography and Network Security, Tata McGraw Hill 2007.
3. Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: PRIVATE
Communication in a PUBLIC World, Prentice Hall, ISBN 0-13-046019-2.

CS8792 CRYPTOGRAPHY AND NETWORK SECURITY NOTES

If you have any queries or comments on this post, kindly contact us through contact form or telegram