ANNA UNIVERSITY, CHENNAI
REGULATIONS - 2013
CP8351 SECURITY PRINCIPLES AND PRACTICES SYLLABUS
CP8351 SECURITY PRINCIPLES AND PRACTICES SYLLABUS
ME 3RD SEM COMPUTER SCIENCE AND ENGINEERING SYLLABUS
OBJECTIVES:
To understand the mathematical foundations of security principles
To appreciate the different aspects of encryption techniques
To understand the role played by authentication in security
To appreciate the current trends security practices
To understand the mathematical foundations of security principles
To appreciate the different aspects of encryption techniques
To understand the role played by authentication in security
To appreciate the current trends security practices
UNIT I INTRODUCTION AND MATHEMATICAL FOUNDATION
An illustrative communication game – safeguard versus attack – Probability and Information Theory - Algebraic foundations – Number theory.
UNIT II ENCRYPTION – SYMMETRIC TECHNIQUES
Substitution Ciphers – Transposition Ciphers – Classical Ciphers – DES – AES – Confidentiality Modes of Operation – Key Channel Establishment for symmetric cryptosystems.
UNIT III ENCRYPTION – ASYMMETRIC TECHNIQUES AND DATA TECHNIQUES
Diffie-Hellman Key Exchange protocol – Discrete logarithm problem – RSA cryptosystems & cryptanalysis – ElGamal cryptosystem – Need for stronger Security Notions for Public key Cryptosystems – Combination of Asymmetric and Symmetric Cryptography – Key Channel Establishment for Public key Cryptosystems - Data Integrity techniques – Symmetric techniques - Asymmetric techniques
UNIT IV AUTHENTICATION
Authentication Protocols Principles – Authentication protocols for Internet Security – SSH Remote logic protocol – Kerberos Protocol – SSL & TLS – Authentication frame for public key Cryptography – Directory Based Authentication framework – Non - Directory Based Public-Key Authentication framework .
UNIT V SECURITY PRACTICES
Protecting Programs and Data – Information and the Law – Rights of Employees and Employers – Software Failures – Computer Crime – Privacy – Ethical Issues in Computer Security.
TOTAL: 45 PERIODS
OUTCOMES:
Upon Completion of the course, the students will be able to
Use the mathematical foundations in security principles
Identify the features of encryption and authentication
Use available security practices
REFERENCES:
1. William Stallings, “Crpyptography and Network security: Principles and Practices”, Pearson/PHI, 5th Edition, 2010.
2. Behrouz A. Forouzan, “Cryptography and Network Security”, 2nd Edition, Tata McGraw Hill Education, 2010.
3. Wade Trappe, Lawrence C Washington, “Introduction to Cryptography with coding theory”, 2nd Edition, Pearson, 2007.
4. Douglas R. Stinson ,“Cryptography Theory and Practice ”, 3rd Edition, Chapman & Hall/CRC, 2006.
5. W. Mao, “Modern Cryptography – Theory and Practice”, Pearson Education, 2nd Edition, 2007.
6. Charles P. Pfleeger, Shari Lawrence Pfleeger, “Security in computing”, 3rd Edition, Prentice Hall of India, 2006.
7. Wenbo Mao, “Modern Cryptography – Theory and Practice”, Pearson Education, 2006.
8. Charlie Kaufman, Radia Perlman and Mike Speciner, “ Network Security Private Communication in a Public World”, PHI, Second Edition, 2012
2. Behrouz A. Forouzan, “Cryptography and Network Security”, 2nd Edition, Tata McGraw Hill Education, 2010.
3. Wade Trappe, Lawrence C Washington, “Introduction to Cryptography with coding theory”, 2nd Edition, Pearson, 2007.
4. Douglas R. Stinson ,“Cryptography Theory and Practice ”, 3rd Edition, Chapman & Hall/CRC, 2006.
5. W. Mao, “Modern Cryptography – Theory and Practice”, Pearson Education, 2nd Edition, 2007.
6. Charles P. Pfleeger, Shari Lawrence Pfleeger, “Security in computing”, 3rd Edition, Prentice Hall of India, 2006.
7. Wenbo Mao, “Modern Cryptography – Theory and Practice”, Pearson Education, 2006.
8. Charlie Kaufman, Radia Perlman and Mike Speciner, “ Network Security Private Communication in a Public World”, PHI, Second Edition, 2012
No comments:
Post a Comment