Unit I Security Fundamentals
Introduction, Terminology, Attacks, Security Goals : Authentication, Authorization, Cipher Techniques: Substitution and Transposition, One Time
Pad, Modular Arithmetic, GCD, Euclid’s Algorithms, Chinese Remainder
Theorem, Discrete Logarithm, Fermat Theorem, Block Ciphers, Stream
Ciphers. Secret Splitting and Sharing.
(8 Hrs.)
Unit II Cryptography
Symmetric Key Algorithms: DES, AES, BLOFISH, Attacks on DES. Modes of
Operations, Linear Cryptanalysis and Differential Cryptanalysis. Public Key
Algorithms: RSA, Key Generation and Usage, ECC. Hash Algorithms: SHA-1,
MD5.
(8 Hrs.)
Unit III Key Management
Introduction, Key Management: Generations, Distribution, Updation, Digital
Certificate, Digital Signature, PKI. Diffiee Hellman Key Exchange. One Way
Authtication, Mutual Authentication, Neeham Schroeder Protocol.
(8 Hrs.)
Unit IV Network Security
Layer Wise Security Concerns, IPSEC- Introduction, AH and ESP, Tunnel
Mode, Transport Mode, Security Associations, SSL- Introduction, Handshake
Protocol, Record Layer Protocol. IKE- Internet Key Exchange Protocol.
Intrusion Detection Systems: Introduction, Anomaly Based, Signature Based,
Host Based, Network Based Systems.
(8 Hrs.)
Unit V Security Management and Applications
ISO 27001 Security Standard: Introduction, Evolution of standard,
Organizational Context, Implementation, Certifications and benefits. Electronic
Payment: Introduction, Payment types, Smart Cards, Chip card transactions and
attacks, Payment over internet, Mobile Payments, Electronic Cash.
(6 Hrs.)
Unit VI Cyber Crimes & Laws
Introduction, Computer Forensics, Online Investgative tool, tracing and
recovering electronic evidence, Internet fraud, Identity Theft, Industrial
Espionage, Cyber Terrorism. Indian IT laws: Introduction and briefs of Law
clauses.
(6 Hrs.)
Text Books :
2. Bernard Menezes, “Network Security and Cryptography”, Cengage Learning, ISBN-
978-81-315-1349-1
Reference Books :
1. Nina Godbole, “ Information Systems Security”, Wiley India Pvt Ltd, ISBN -978-81-
265-1692-6
Willaim Stallings, “Computer Security : Principles and Practices”, Pearson Ed.
3. Mark Merkow, “ Information Security-Principles and Practices”, Pearson Ed. 978-81-
317-1288-7
4. CK Shyamala et el., “Cryptography and Security”, Wiley India Pvt Ltd, ISBN 978-81-
265-2285-9
5. Berouz Forouzan, “Cryptography and Network Security”, 2 edition, TMH, ISBN :
9780070702080