Sunteți pe pagina 1din 5

1

UNIVERSITY INSTITUTE OF ENGINEERING (UIE)

Department of Computer Science and Engineering

B.E. – Computer Science and Engineering

Subject Name Security & Cryptography

Subject Code CST-415

Branch Computer Science and Engineering – IS

Semester 7th

Faculty Name Surendra Singh Chauhan

Designation Assistant Professor


2

Syllabus of the subject


Security & Cryptography (CST-415)
CHANDIGARH UNIVERSITY, GHARUAN

Security & Cryptography L T P C


Subject Code
Total Contact Hours : 45Hours
CST-415 3 0 0 3
Common to all Specializations of CSE is 4thYear

Prerequisite: Studied computer networks

Marks-100

Internal-40 External-60

Course Objectives

 Understand OSI security architecture and classical encryption techniques and understand various
block cipher and stream cipher models.
 Describe the principles of public key cryptosystems, hash functions and digital signature and
knowledge about the security practices which are adopted
 Understand the various vulnerable attacks and working with the security services
Unit
Course Outcomes: Upon Completion of the course, the students should be able to:
Describe network security services and mechanisms.
I • Symmetrical and Asymmetrical cryptography.

II Data integrity, Authentication, Digital
Signatures.
III • Various network security applications, IPSec, Firewall, IDS, Web security, Email
security, and Malicious software etc.

Contents of the Syllabus

UNIT –I [15h]

Introduction & Number Theory: Services, Mechanisms and attacks-the OSI security architecture-
Network security model-Classical Encryption techniques (Symmetric cipher model, substitution
techniques, transposition techniques, steganography).FINITE FIELDS AND NUMBER THEORY:
Groups, Rings, Fields-Modular arithmetic-Euclid‟s algorithm-Finite fields- Polynomial Arithmetic –
Prime numbers-Fermat‟s and Euler‟s theorem-Testing for primality -The Chinese remainder
theorem- Discrete logarithms.

Block Ciphers & Public Key Cryptography: Data Encryption Standard-Block cipher principles-
block cipher modes of operation-Advanced Encryption Standard (AES)-Triple DES-Blowfish-RC5
algorithm. Public key cryptography: Principles of public key cryptosystems-The RSA algorithm-
Key management – Diffie Hellman Key exchange-Elliptic curve arithmetic-Elliptic curve
cryptography.
3

UNIT II [15h]

Hash Functions And Digital Signatures: Authentication requirement – Authentication function –


MAC – Hash function – Security of hash function and MAC –MD5 – SHA – HMAC – CMAC –
Digital signature and authentication protocols – DSS – EI Gamal – Schnorr.

Security Practice & System Security: Authentication applications – Kerberos – X.509


Authentication services – Internet Firewalls for Trusted System: Roles of Firewalls – Firewall related
terminology- Types of Firewalls – Firewall designs – SET for E-Commerce Transactions. Intruder –
Intrusion detection system – Virus and related threats – Countermeasures – Firewalls design
principles – Trusted systems – Practical implementation of cryptography and security.

UNIT III [15h]

E-mail Security: Security Services for E-mail-attacks possible through E-mail – establishing keys
privacy-authentication of the source-Message Integrity-Non-repudiation-Pretty Good Privacy-
S/MIME.

IPSecurity: Overview of IPSec – IP and IPv6-Authentication Header-Encapsulation Security


Payload (ESP)-Internet Key Exchange (Phases of IKE, ISAKMP/IKE Encoding).

Web Security: SSL/TLS Basic Protocol-computing the keys- client authentication-PKI as deployed
by SSL Attacks fixed in v3- Exportability-Encoding-Secure Electronic Transaction (SET).

Text Books:

1. William Stallings, Cryptography and Network Security, 6th Edition, Pearson Education, March 2013.
2. Charlie Kaufman, Radia Perlman and Mike Speciner, “Network Security”, Prentice Hall of India, 2002.

Reference Books:
1. Behrouz A. Ferouzan, “Cryptography & Network Security”, Tata McGraw Hill.
2. Man Young Rhee, “Internet Security: Cryptographic Principles”, “Algorithms and Protocols”, Wiley
Publications.
3. Charles Pfleeger, “Security in Computing”, 4th Edition, Prentice Hall of India.
4. Ulysess Black, “Internet Security Protocols”, Pearson Education Asia.
5. Charlie Kaufman and Radia Perlman, Mike Speciner, “Network Security, Second Edition, Private
Communication in Public World”, PHI.
4

Subject Code
Security & Cryptography
CST-415

Department Teaching
Department of CSE (IS)
the Subject

1 2 3 4 5 6 7 8 9 10 11
Program Outcome

Mapping of Course I, I,
outcome with Program II, III II,
outcome III III

Project/
BS ES PD PE OE
Category PC Training

Approval Date of meeting of the Board of Studies

The student outcomes are:


a) An ability to apply to apply knowledge of mathematics and engineering.
b) An ability to design and conduct experiments, as well as to analyze and interpret data.
c) An ability to design a system, component or process to meet desired needs without realistic constraints such as
economic,environmental,social,political,ethical,health& safety, manufacturability and sustainability.
d) An ability to function on multidisciplinary teams.
e) An ability to identify formulates and solves engineering problems.
f) An understanding of professional and ethical responsibility.
g) An ability to communication effectively.
h) The board education necessary to understand the impact of engineering solutions in global, economic,
environmental and societal context.
i) Recognition of the need for, and an ability to engage in life-long learning.
j) Knowledge of contemporary issues.
k) An ability to use the techniques skills, and modern engineering tools necessary for engineering practice

Instructions for the Paper-Setter

Please go through these instructions thoroughly and follow the same pattern while setting the paper
as the students have been prepared according to this format.

Maximum Marks = 60 Time: 3 Hrs

Weight age per unit = 20 marks (excluding over attempt weight age)

1. Question Paper will consist of ten questions.


2. Section A of question paper is compulsory, containing five parts each of 2 marks covering the
whole syllabus (short answer type- total 10 marks)
5

3. Set three questions from each unit I, II and III. Students will attempt 5 questions selecting at least
one question from sections B, C & D. Each question carries 10 marks. Questions of Section B will be
from unit I, Questions of Section C from unit II and Questions of section D from unit III.

4. In the question paper, distribution of the questions should be by considering 30 % numerical part
and 70 % conceptual.

S-ar putea să vă placă și