CP8351 SECURITY PRINCIPLES AND PRACTICES SYLLABUS FOR ME 3RD SEM CSE - Anna University Multiple Choice Questions

CP8351 SECURITY PRINCIPLES AND PRACTICES SYLLABUS FOR ME 3RD SEM CSE

ANNA UNIVERSITY, CHENNAI
REGULATIONS - 2013
 CP8351 SECURITY PRINCIPLES AND PRACTICES SYLLABUS
ME 3RD SEM COMPUTER SCIENCE AND ENGINEERING SYLLABUS
CP8351 SECURITY PRINCIPLES AND PRACTICES SYLLABUS
CP8351 SECURITY PRINCIPLES AND PRACTICES SYLLABUS
OBJECTIVES:
 To understand the mathematical foundations of security principles
 To appreciate the different aspects of encryption techniques
 To understand the role played by authentication in security
 To appreciate the current trends security practices

UNIT I INTRODUCTION AND MATHEMATICAL FOUNDATION
An illustrative communication game – safeguard versus attack – Probability and Information Theory - Algebraic foundations – Number theory.

UNIT II ENCRYPTION – SYMMETRIC TECHNIQUES

Substitution Ciphers – Transposition Ciphers – Classical Ciphers – DES – AES – Confidentiality Modes of Operation – Key Channel Establishment for symmetric cryptosystems.

UNIT III ENCRYPTION – ASYMMETRIC TECHNIQUES AND DATA TECHNIQUES
Diffie-Hellman Key Exchange protocol – Discrete logarithm problem – RSA cryptosystems & cryptanalysis – ElGamal cryptosystem – Need for stronger Security Notions for Public key Cryptosystems – Combination of Asymmetric and Symmetric Cryptography – Key Channel Establishment for Public key Cryptosystems - Data Integrity techniques – Symmetric techniques - Asymmetric techniques

UNIT IV AUTHENTICATION
Authentication Protocols Principles – Authentication protocols for Internet Security – SSH Remote logic protocol – Kerberos Protocol – SSL & TLS – Authentication frame for public key Cryptography – Directory Based Authentication framework – Non - Directory Based Public-Key Authentication framework .

UNIT V SECURITY PRACTICES
Protecting Programs and Data – Information and the Law – Rights of Employees and Employers – Software Failures – Computer Crime – Privacy – Ethical Issues in Computer Security.

TOTAL: 45 PERIODS

OUTCOMES:
Upon Completion of the course, the students will be able to
 Use the mathematical foundations in security principles
 Identify the features of encryption and authentication
 Use available security practices

REFERENCES: 
1. William Stallings, “Crpyptography and Network security: Principles and Practices”, Pearson/PHI, 5th Edition, 2010.
2. Behrouz A. Forouzan, “Cryptography and Network Security”, 2nd Edition, Tata McGraw Hill Education, 2010.
3. Wade Trappe, Lawrence C Washington, “Introduction to Cryptography with coding theory”, 2nd Edition, Pearson, 2007.
4. Douglas R. Stinson ,“Cryptography Theory and Practice ”, 3rd Edition, Chapman & Hall/CRC, 2006.
5. W. Mao, “Modern Cryptography – Theory and Practice”, Pearson Education, 2nd Edition, 2007.
6. Charles P. Pfleeger, Shari Lawrence Pfleeger, “Security in computing”, 3rd Edition, Prentice Hall of India, 2006.
7. Wenbo Mao, “Modern Cryptography – Theory and Practice”, Pearson Education, 2006.
8. Charlie Kaufman, Radia Perlman and Mike Speciner, “ Network Security Private Communication in a Public World”, PHI, Second Edition, 2012

No comments:

Post a Comment