CS6701/
18CS2005
CRYPTOGRAPHY AND NETWORK SECURITY
L T P C
Materials available
UNIT I INTRODUCTION & NUMBER THEORY 10
Services, Mechanisms and attacks-the OSI security architecture-Network security model-classical Encryption techniques (Symmetric cipher model, substitution techniques, transposition techniques, steganography).FINITE FIELDS AND NUMBER THEORY: Groups, Rings, Fields-Modular arithmetic- Euclid’s algorithm-Finite fields- Polynomial Arithmetic –Prime numbers-Fermat’s and Euler’s theorem- Testing for primality -The Chinese remainder theorem- Discrete logarithms.
UNIT II BLOCK CIPHERS & PUBLIC KEY CRYPTOGRAPHY 10
Data Encryption Standard-Block cipher principles-block cipher modes of operation-Advanced Encryption Standard (AES)-Triple DES-Blowfish-RC5 algorithm. Public key cryptography: Principles of public key cryptosystems-The RSA algorithm-Key management – Diffie Hellman Key exchange-Elliptic curve arithmetic-Elliptic curve cryptography.
UNIT III HASH FUNCTIONS AND DIGITAL SIGNATURES 8
Authentication requirement – Authentication function – MAC – Hash function – Security of hash function and MAC –MD5 – SHA – HMAC – CMAC – Digital signature and authentication protocols – DSS – EI Gamal – Schnorr.
UNIT IV SECURITY PRACTICE & SYSTEM SECURITY 8
Authentication applications – Kerberos – X.509 Authentication services – Internet Firewalls for Trusted System: Roles of Firewalls – Firewall related terminology- Types of Firewalls – Firewall designs – SET for E-Commerce Transactions. Intruder – Intrusion detection system – Virus and related threats – Countermeasures – Firewalls design principles – Trusted systems – Practical implementation of
cryptography and security.
UNIT V E-MAIL, IP & WEB SECURITY 9
E-mail Security: Security Services for E-mail-attacks possible through E-mail – establishing keys privacy-authentication of the source-Message Integrity-Non-repudiation-Pretty Good Privacy-S/MIME. IPSecurity: Overview of IPSec – IP and IPv6-Authentication Header-Encapsulation Security Payload (ESP)-Internet Key Exchange (Phases of IKE, ISAKMP/IKE Encoding). Web Security: SSL/TLS Basic Protocol-computing the keys- client authentication-PKI as deployed by SSLAttacks fixed in v3- Exportability-Encoding-Secure Electronic Transaction (SET). TOTAL: 45 PERIODS
18CS2005 Cryptography and Network Security L T P C 3 0 0 3
Course Objectives: Enable the student to
1. list the different kinds of security issues.
2. classify the various security algorithms and their features
3. combine the various security methods for designing a trusted secure network
Course Outcomes: The student will be able to
1. summarize the computer security concepts and their needs.
2. apply the various symmetric and asymmetric key algorithms.
3. experiment with the various principles of cryptosystems, hashing algorithms and digital signatures
4. recognize the importance of network security.
5. evaluate network and internet security.
6. explain the different types of virus/worms & firewalls.
Module 1: Introduction to Cryptography and Symmetric Key Ciphers Computer Security Concepts - OSI Security Architecture -Security Attacks - Services, Mechanisms - Symmetric Cipher Model - Traditional Block Cipher Structure - The Data Encryption Standard -The Strength of DES - Advanced Encryption Standard. Module 2: Public Key Cryptography Principles of public key cryptosystems-RSA algorithm-Diffie- Hellman Key Exchange-El Gamal Cryptosystem- Elliptic Curve Cryptography
Module 3: Cryptographic Data Integrity Algorithms Applications of cryptographic hash functions-requirements and security-Secure Hash Algorithm -SHA3- Message authentication requirements, functions & codes-HMAC-digital signatures- NIST-Digital signature Algorithm (DSA)
Module 4: Key Management and User Authentication X.509 certificates- Public Key infrastructure-remote user authentication principles-remote user authentication using symmetric and asymmetric encryption-Kerberos V5 Module 5: Web Security and Email Security Web security issues-Secure Socket Layer-Transport Layer Security-pretty good privacy (PGP)-S/MIME
Module 6: IP and System Security IP security overview-IP security policy-Encapsulating Security payload-intruders-intrusion detection virus/worms-countermeasure-need for firewalls-firewall characteristics-types of firewalls
Text Books:
1. William Stallings, “Cryptography and network security: Principles and practices”, 7th Edition, ISBN-13: 978-9332585225, Pearson Education.
2. Behrouz A. Forouzan, Debdeep Mukhopadhyay, “Cryptography and network security”, 3rd Edition, ISBN-13: 978-9339220945, McGraw Hill Education
Reference Books:
1. William Stallings, “Network Security Essentials: Applications and Standards”, ISBN-13: 978- 9352866601, 6th edition, Pearson Education.
2. Atul Kahate, “Cryptography and Network Security”, 3rd Edition, McGraw Hill Education, ISBN13: 978-1259029882
3. Wenbo Mao, “Modern Cryptography”, First Edition, Pearson Education, 2008 ISBN-13: 978- 0132887410
4. Roberta Bragg, Mark Rhodes, Keith Strassberg, “Network Security: The Complete Reference”, Tata McGraw Hill Edition, 2008. ISBN-13: 978-0070586710
5. Charlie Kaufman, Radia Perlman, Mike Speciner, “Network Security: Private Communication in a Public World”, Second Edition, Pearson Education, 2016, ISBN-13: 978-0130460196