Skip to main content

CRYPTOGRAPHY AND NETWORK SECURITY NOTE

Lecture Notes Unit Wise

CRYPTOGRAPHY AND NETWORK SECURITY (CNS) Notes Unit Wise

Unit I

Basic Principles:

          

Unit II

Symmetric Encryption:

 

Unit III

Asymmetric    Encryption:

 

Unit IV

Data Integrity, Digital Signature Schemes & Key Management:

Unit V

Network Security:


OU  BE (CSE)                        AICTE            
With effect from Academic Year 2022 2023

 

        
            CRYPTOGRAPHY AND NETWORK SECURITY

                                                 PC 604 CS

Instruction: 3L+1T periods per week         Duration of SEE: 3 hours 
CIE:30 marks             SEE: 70marks                Credits: 3

Course Objectives:-

Ø   Understand security concepts, Ethics in Network Security.

Ø    Obtain knowledge on mechanisms to encounter threats

Ø    Appreciate and apply relevant cryptographic techniques

Ø    Apply authentication services and security mechanisms

Ø    Comprehend computer network access control and ethics in network security.

 

Course Outcomes: At the end of the course the students will be able to -

Ø    Develop familiarity with cryptography and security techniques

Ø    Master fundamentals of secret and public cryptography

Ø    Utilizer the master protocols for security services

Ø    Identify network security threats and counter-measures

Ø    Propose network security designs using available secure solutions

 

UNIT- I

Basic Principles: Security Goals, Cryptographic Attacks, Services and Mechanisms, Mathematics of Cryptography

UNIT –II

Symmetric Encryption: Mathematics of Symmetric Key Cryptography, Introduction to Modern Symmetric Key Ciphers, Data Encryption Standard, Advanced Encryption Standard. 

UNIT- III

Asymmetric Encryption: Mathematics of Asymmetric Key Cryptography, Asymmetric Key Cryptography 

UNIT –IV

Data Integrity, Digital Signature Schemes & Key Management: Message Integrity and Message Authentication, Cryptographic Hash Functions, Digital Signature, Key Management

UNIT-V

Network Security: Security at Application layer (PGP and S/MIME), Security at the Transport Layer(SSL and TLS), Security at the Network Layer(IPSec, System Security) 

Text Book

1. Cryptography and Network Security, Behrouz A Forouzan, Debdeep Mukhopadhyay, (3e) Mc Graw Hill. 

Reference Books

1. Cryptography and Network Security, William Stallings, (6e) Pearson.
2. Everyday Cryptography, Keith M.Martin, Oxford.
3. Network Security and Cryptography, Bernard Meneges, Cengage Learning
4. Cryptography and Network Security – by Atul Kahate – TMH.
5. Cyber Security Operations Handbook – by J.W. Rittiaghouse and William M.Hancok – Elseviers.
6. Khairol Amali Bin Ahmad , Khaleel Ahmad , Uma N. Dulhare ,Functional Encryption , EAI/Springer Innovations in Communication and Computing,1st ed. 2021 Edition

CSE SYLLABUS ( Osmania University )


 


35


Comments

Popular posts from this blog

DESIGN AND ANALYSIS OF ALGORITHMS – QUESTION BANK (CSE)

   ISL   ENGINEERING   COLLEGE DEPARTMENT   OF   COMPUTER   SCIENCE   AND   ENGINEERING DESIGN   AND   ANALYSIS   OF   ALGORITHMS QUESTION   BANK                                         BE III Year II Semester (A & B Sections) –PC 603 CS     Academic   Year: 2020-21 SHORT   ANSWER   QUESTIONS   UNIT-I 1.        Why   is an algorithm analysis required? 2.        State   about   UNION &   FIND   operations. 3.        List   out   the   UNION   algorithm   using   weighting   rule. 4.        Given   f(n)=10n 2 +4n+3,   then   prove   that   f(n)=O(n 2 ). 5.  ...

Cryptography and Network Security (CNS)

  CRYPTOGRAPHY AND NETWORK SECURITY (CNS) Unit I to V  Click Here Attacks on Computers and Computer Security SYLLABUS UNIT – I Security Concepts : Introduction, The need for security, Security approaches, Principles of security, Types of Security attacks, Security services, Security Mechanisms, A model for Network Security Cryptography Concepts and Techniques : Introduction, plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography, steganography, key range and key size, possible types of attacks. UNIT – II Symmetric key Ciphers : Block Cipher principles, DES, AES, Blowfish, RC5, IDEA, Block cipher operation, Stream ciphers, RC4. Asymmetric key Ciphers : Principles of public key cryptosystems, RSA algorithm, Elgamal Cryptography, Diffie-Hellman Key Exchange, Knapsack Algorithm. UNIT – III Cryptographic Hash Functions : Message Authentication, Secure Hash Algorithm (SHA- 512), Message auth...

Introduction

  Welcome to Best Information for Learners and Job Seekers. Here you can find the best videos related to education and new technologies in the market as well as Govt. and Private Jobs. In this blog I am passing the information to users for user betterment to find the Education Material, Videos, Jobs and Others. Subscribe the You Tube Channel for E-learning Courses. PATHAN AHMED KHAN M.Tech.(Ph.D.)  Assistant Professor ISL Engineering College Mobile No: 0091-8019309323 email id: pathan.ahmed0504@gmail.com                 pathansknowledgehub@gmail.com