Documente Academic
Documente Profesional
Documente Cultură
Course No CSE403P
Text Book:
2 Security in Computing (Second Edition)', Charles P.Pfleeger, 1996, Prentice Hall International, Inc. 3 Cryptography & Network Security, Atul Kahate, TMH 4 Cryptography & Security , C K Shyamala, N Harini and Dr T R Padmanabhan 2011 ,Wiley-India 5 Applied Cryptography: Protocols, Algorithms, and Source Code in C, Bruce Schneier, John Wiley and Sons 6 Firewalls and Internet Security, Bill Cheswick and Steve Bellovin, Addison-Wesley 7 Security Technologies for the world wide web, Rolf Oppliger, Artech House, Inc.
Other Reading Sr No Jouranls atricles as compulsary readings (specific articles, Complete reference) 8 Bellovin. S. and Cheswick W. Network Firewalls, IEEE communication Magazine 9 Jurisic, A. And Menezes, A. Elliptical curves & Cryptography, Dr. Dobbs Journals 10 Chess, D. The Future of viruses on the internet. Proceedings, virus bulletin International conference 11 Anderson, J. Computer security Threat monitoring and surveillance. Fort Washington, P.A.James P. Anderson Co. Relevant Websites
Sr. No. (Web adress) (only if relevant to the courses) 12 http://www.rsa.com/rsalabs/node.asp?id=2262 13 http://people.csail.mit.edu/rivest/Rsapaper.pdf
Salient Features Key management and its uses Digital signature and its purpose to use
*Each experiment of the lab will be evaluated using following relative scheme:
Component J/E WR VIVA % of Marks 50 20 30
List of experiments :Lecture Number Program 1 Program 2 Program 3 Program 4 Program 5 Program 6 Lecture Topic Pedagogical Tools Or Equipment Planned lab Manual Not Applicable Not Applicable Not Applicable Not Applicable Not Applicable Not Applicable
Encryption/Decryption using Caeser Cipher Technique. C/C++ Encryption/Decryption using Monoalphabetic Cipher Technique. Encryption/Decryption using Hill Cipher Technique. Encryption/Decryption using Polyalphabetic Cipher Technique. Encryption/Decryption using One time pad technique. C/C++
Mid Term
Program 7 Program 8 Program 9 Program 10 Encryption/Decryption using Data Encryption Standard C/C++ (Up to Expansion Permutation Step). Encryption/Decryption using DES (Cont. from last program). Encryption/Decryption using Advanced Encryption Standard (Up to Key expansion step). Encryption/Decryption using AES (Cont. from last program). C/C++ C/C++ C/C++ Not Applicable Not Applicable Not Applicable Not Applicable
Program 11
C/C++
Not Applicable
Spill Over
Program 12 Program 13 Not Applicable Not Applicable