EL7004 CRYPTOGRAPHY AND NETWORK SECURITY SYLLABUS FOR ME 2ND SEM ECE REG 2013 - Anna University Multiple Choice Questions

EL7004 CRYPTOGRAPHY AND NETWORK SECURITY SYLLABUS FOR ME 2ND SEM ECE REG 2013

 ANNA UNIVERSITY, CHENNAI
REGULATIONS - 2013
 EL7004 CRYPTOGRAPHY AND NETWORK SECURITY SYLLABUS
ME 2ND SEM ELECTRONICS AND COMMUNICATION ENGINEERING SYLLABUS
EL7002 MACHINE VISION SYLLABUS
 EL7004 CRYPTOGRAPHY AND NETWORK SECURITY SYLLABUS
OBJECTIVES:
1. To provide practical survey of principles and practices of Cryptography and network security.
2. To gain knowledge on basic issues to be addressed by network security capability.
3. To introduce the principles of number theory and the practice of network security and cryptographic algorithms.
4. To gain Knowledge on different encryption and decryption schemas.
5. To provide basic concepts about system security and attacks.

OUTCOMES:

1. Security trends- Evaluation of the security of commercial security products organizational policies and software design.
2. Cryptographic Algorithm- Construction of the security within the software design or software deployment.
3. Security Terminologies- Speaking cogently about security using the terms of art.
4. Security Authentication- Making the data transmission security by the process of Authentication.
5. System security- Evaluation of the security among the systems by making the firewall and security standards efficient.

UNIT I INTRODUCTION AND NUMBER THEORY
Introduction to Security trends – Attacks and services – Classical crypto systems – Types of ciphers – LFSR sequences – Basic Number theory – Congruence – Transposition cipher-Chinese Remainder theorem – Modular exponentiation – Fermat and Euler's theorem – Legendre and Jacobi symbols – Finite fields – continued fractions-EFS and applications.

UNIT II PUBLIC KEY ENCRYPTION
DES module– Differential cryptoanalysis – Simple DES – Modes of operations – Triple DES –AES – RC4 and RC5 – RSA – Attacks – Primality test –Cayley Purser algorithm– factoring Technique- Probabilistic public key encryption, Case study of applications of DES

UNIT III MESSAGE AUTHENTICATION
Spoofing techniques and types-Discrete Logarithms – Computing discrete logs – Diffie-Hellman key exchange –ElGamal Public key cryptosystems – FIPS-Hash functions – Secure Hash – Birthday attacks - MD5 – Digital signatures – RSA –SecureID- ElGamal – DSA-Quantum cryptography-Okamoto Uchiyama cryptosystem.

UNIT IV NETWORK SECURITY PRACTICE
Authentication applications – Kerberos, X.509, PKI – Electronic Mail security – PGP,S/MIME – IP security – Web Security – SSL, TLS, SET-CWU Data security-Fire Sale attack-Mellisa-Sadmind- Nimda - Nmap security- Detecting conficker

UNIT V SYSTEM SECURITY
System security – Intruders – Malicious software – viruses –Oral Roberts, Jimmy Hoffa virus – Firewalls – Security-Standards- Cross-Site Port Attacks- CAPTCHA Re-Riding Attack.

TOTAL:45 PERIODS

REFERENCES:

1. William Stallings,“Crpyptography and Network security Principles and Practices”,Pearson/PHI, 5th ed, 2012.
2. Wade Trappe, Lawrence C Washington, “Introduction to Cryptography with coding theory”, 2nd ed, Pearson, 2007.
3. W. Mao, “Modern Cryptography – Theory and Practice”, Pearson Education, Second Edition, 2007.
4. Charles P. Pfleeger, Shari Lawrence Pfleeger – Security in computing Third Edition – Prentice Hall of India, 2006.

No comments:

Post a Comment