Você está na página 1de 2

COURSE INFORMATION SHEET

PROGRAMME: Information Technology DEGREE: BTECH


COURSE: Crytograhy an! "et#or$ Sec%rity SEMESTER:I CREDITS: &
COURSE CODE: R&'()' REGU*ATIO":R'( COURSE T+PE: Core ,Electi-e , Brea!th, S.H
COURSE AREA,DOMAI": Com%ter "et#or$/ CO"TACT HOURS: &0' 1T%torial2 ho%r/,3ee$4
SYLLABUS:
U"IT DETAI*S HOURS
I
Intro!%ction: Sec%rity Attac$/5 Sec%rity Ser-ice/5 Sec%rity Mechani/m/5 an! a Mo!el for "et#or$
Sec%rity5 "on6Crytograhic Protocol 7%lnera8ilitie/6DoS5 DDoS5 Se//ion Hi9ac$ing an! Soofing5
Soft#are 7%lnera8ilitie/6 Phi/hing5 B%ffer O-erflo#5 :ormat String Attac$/5 S;* In9ection5 Ba/ic/ of
Crytograhy < Symmetric Ciher Mo!el5 S%8/tit%tion Techni=%e/5 Tran/ortation Techni=%e/5 Other
Ciher Proertie/6 Conf%/ion5 Diff%/ion5 Bloc$ an! Stream Ciher/4
'>
II
Secret ?ey Crytograhy: Data Encrytion Stan!ar!1DES25 Strength of DES5 Bloc$ Ciher De/ign
Princile/ an! Mo!e/ of Oeration/5 Trile DES5 International Data Encrytion algorithm5 Blo#fi/h5
CAST6'>@5AES
''
III
"%m8er Theory: Prime an! Relati-ely Prime "%m8er/5 Mo!%lar Arithmetic5 :ermatA/ an! E%lerA/
Theorem/5 the Chine/e Remain!er Theorem5 Di/crete *ogarithm/4
B
I7
P%8lic ?ey Crytograhy: Princile/ of P%8lic ?ey Cryto/y/tem/5 RSA Algorithm5 Diffie6Hellman
?ey ECchange5 Intro!%ction to Ellitic C%r-e Crytograhy4
D
7
Crytograhic Ha/h :%nction/: Alication/ of Crytograhic Ha/h :%nction/5 Sec%re Ha/h Algorithm5
Me//age A%thentication Co!e/ < Me//age A%thentication Re=%irement/ an! :%nction/5 HMAC5 Digital
/ignat%re/5 Digital Signat%re Scheme/5 A%thentication Protocol/5 Digital Signat%re Stan!ar!/4
'(
7I
A%thentication Alication/: ?er8ero/5 ?ey Management an! Di/tri8%tion5 E4)(B Directory
A%thentication /er-ice5 P%8lic ?ey Infra/tr%ct%re5 Electronic Mail Sec%rity: Pretty Goo! Pri-acy5
S,MIME4
'>
7II
IP Sec%rity: O-er-ie#5 Architect%re5 A%thentication Hea!er5 Enca/%lating Sec%rity Payloa!5 Com8ining
/ec%rity A//ociation/5 Internet ?ey ECchange5 3e8 Sec%rity: 3e8 Sec%rity Con/i!eration/5 Sec%re
Soc$et/ *ayer an! Tran/ort *ayer Sec%rity5 Electronic Payment4
''
7III
Sy/tem Sec%rity: Intr%!er/5 Intr%/ion Detection5 Pa//#or! Management5 Malicio%/ Soft#are <Tye/5
7ir%/e/5 7ir%/ Co%ntermea/%re/5 3orm/5 :ire#all/6 Characteri/tic/5 Tye/ of :ire#all/5 Placement of
:ire#all/5 :ire#all Config%ration5 Tr%/te! /y/tem/4
'(
TOTA* HOURS
@>
TEXT/REFERENCE BOOKS:
T,R BOO? TIT*E,AUTHORS,PUB*ICATIO"
T'
Crytograhy an! "et#or$ Sec%rity: Princile/ an! Practice )th e!ition5 3illiam Stalling/5 Pear/on E! >(''
T>
"et#or$ Sec%rity an! Crytograhy >n! e!ition5 Bernar! MeneFe/5 Cengage *earning >(''
TG
Crytograhy an! "et#or$5 >n! e!ition5 Behro%F A :o%ro%Fan5 De8!ee M%$hoa!hyay5 TMH >('(
T&
Crytograhy an! "et#or$ Sec%rity: Princile/ an! Practice &th e!ition5 3illiam Stalling/5 Pear/on E!
R'
:%n!amental/ of "et#or$ Sec%rity5 Eric Mai#al! 1 Dreamtech re//2
R>
Princile/ of Information Sec%rity5 3hitman5 Thom/on4
RG
Intro!%ction to Crytograhy5 B%chmann5 Sringer
R&
Alie! Crytograhy5 >n! E!ition5 Br%ce Schneier5 Hohn#iley./on/
COURSE PRE-REQUISITES:
C4CODE COURSE "AME DESCRIPTIO" SEM
Computer Netor!" B#"$% Re&ere'%e mo(e)" *+,
R,-,-. C Pro/r#mm$'/ B#"$% Pro/r#mm$'/ Stru%ture" #'( 0#t# t1pe" ,+,
0#t# Stru%ture" Se#r%2$'/ #'( "ort$'/ te%2'$3ue" 4+,
COURSE OB5ECTI6ES:
' EClain the o89ecti-e/ of information /ec%rity
> AnalyFe the tra!eoff/ inherent in /ec%rity
G EClain the imortance an! alication of each of confi!entiality5 integrity5 an! a-aila8ility
& Un!er/tan! the 8a/ic categorie/ of threat/ to com%ter/ an! net#or$/
) Di/c%// i//%e/ for creating /ec%rity olicy for a large organiFation
COURSE OUTCOMES:
S"O DESCRIPTIO" PO
MAPPI"G
'
De/ign a /ec%rity /ol%tion for a gi-en alication4
>
Un!er/tan!/ !ifferent crytograhic algorithm imlementation !etail/
G
AnalyFe a gi-en /y/tem #ith re/ect to /ec%rity of the /y/tem4
7APES IN THE SYLLABUS - TO MEET IN0USTRY/PROFESSION REQUIREMENTS:
S"O DESCRIPTIO" PROPOSED
ACTIO"S
'
7oice an! 7i!eo Crytograhy in a DSP En-ironment
>
The Politic/ of ISoft#are Patent/I
G
Tran/arent Data Encrytion: "e# Technologie/ an! Be/t Practice/ for Data8a/e Encrytion
PROPOSED ACTIO"S: TOPICS BE+O"D S+**ABUS,ASSIG"ME"T,I"DUSTR+ 7ISIT,GUEST *ECTURER,"PTE* ETC
TOPICS BEYON0 SYLLABUS/A06ANCE0 TOPICS/0ESI7N:
8EB SOURCE REFERENCES:
3' htt:,,###4c/4ioc4ee,yi$,/chool/,#in>((&,naor6/li!e/>4)4t
3> htt:,,###4c/4%m!4e!%,J9$atF,gra!cryto>,"OTES,lect%re>4!f
3G htt:,,###4in$a/4net,teaching,ac,>((K,lect%re/,lect%reD4!f
3& htt:,,###4c/4f/%4e!%,J8reno,CIS6KBG(,lect%reL/li!e/,cla//('4!f
3) htt:,,ntel4iitm4ac4in,co%r/e/,'(K'()(G',
0ELI6ERY/INSTRUCTIONAL METHO0OLO7IES:
CHA*? . TA*? STUD4 ASSIG"ME"T 3EB RESOURCES
ASSESSMENT METHO0OLO7IES-0IRECT
ASSIG"ME"TS STUD4 SEMI"ARS TESTS,MODE* EEAMS U"I74 EEAMI"ATIO"
ASSESSMENT METHO0OLO7IES-IN0IRECT
ASSESSME"T O: COURSE OUTCOMES 1B+ :EEDBAC?5 O"CE2 STUDE"T :EEDBAC? O" :ACU*T+ 1T3ICE2
He#( o& t2e 0ep#rtme't
9P+RAMBABU: