EL4004 Cryptography and Network Security Syllabus:
EL4004 Cryptography and Network Security Syllabus – Anna University PG Syllabus Regulation 2021
COURSE OBJECTIVES:
To understand∙ the importance and goals of communication network and information security and introduce them to the different types of attacks.
To expose different approaches to handling security and the algorithms in use for maintaining data integrity and authenticity.
To∙ appreciate the practical aspects of security features design and their implementation in wired and wireless internetworking domains.
UNIT I INTRODUCTION ON SECURITY
Security Goals, Cryptographic attacks, Security services and mechanisms Techniques: Cryptography and Steganography, Traditional Symmetric-Key Ciphers: Substitution Ciphers and Transposition Ciphers, Mathematics for Cryptography.
UNIT II SYMMETRIC & ASYMMETRIC KEY ALGORITHMS
Introduction to Block Ciphers and Stream Ciphers, Data Encryption Standards (DES), Advanced Encryption Standard (AES), RC4, Principle of asymmetric key algorithms, RSA Cryptosystem.
UNIT III INTEGRITY, AUTHENTICATION AND KEY MANAGEMENT
Message Integrity, Hash functions: SHA 512, Whirlpool, Digital signatures: Digital signature standards. Authentication: Entity Authentication: Biometrics, Key management Techniques.
UNIT IV NETWORK SECURITY, FIREWALLS AND WEB SECURITY
Introduction on Firewalls, Types of Firewalls, IP Security, E-mail security: PGP- S/MIME, Web security: SSL-TLS, SET.
UNIT V WIRELESS NETWORK SECURITY
Security Attack issues specific to Wireless systems: Worm hole, Tunneling, DoS. Security for WLAN, Security for Broadband networks: Security challenges in 4G and 5G deployments, Introduction to side channel attacks and their counter measures.
COURSE OUTCOMES:
Upon completion of this course, the students will be
CO1:Able to demonstrate an understanding of the ways in which communication network security may get compromised and the basic principles of security algorithm design.
CO2:Familiar with the different types of security attacks, approaches to handling security and the algorithms in use for maintaining data integrity and authenticity
CO3:Able to implement and analyse the different algorithms and compare their performances.
CO4:Able to appreciate the practical aspects of security features design and their implementation in wired and wireless internetworking domains
CO5:In a position to apply his knowledge for designing or modifying existing algorithms and implementing using simulation.
TOTAL:45 PERIODS
REFERENCES
1. Behrouz A. Forouzan ,”Cryptography and Network security”, McGraw- Hill, 2011
2. William Stallings, “Cryptography and Network security: principles and practice”, Prentice Hall of India, New Delhi, 2nd Edition,2002
3. AtulKahate ,“Cryptography and Network security”, Tata McGraw-Hill,2nd Edition, 2008.
4. R.K.Nichols and P.C. Lekkas ,“Wireless Security: Models , threats and Solutions”, McGraw- Hill, 2001.
5. H. Yang et al., “Security in Mobile Ad Hoc Networks: Challenges and Solution”, IEEE Wireless Communications, Feb. 2004.
6. “Securing Ad Hoc Networks”, IEEE Network Magazine, vol. 13, no. 6, pp. 24-30, December 1999.
7. “Security of Wireless Ad Hoc Networks,” http://www.cs.umd.edu/~aram/wireless/ survey.pdf
8. David Boelet.al,“Securing Wireless Sensor Networks – Security Architecture”, Journal of networks , Vol.3. No. 1. pp. 65 -76, Jan 2008.
9. Perrig, A., Stankovic, J., Wagner, D., “Security in Wireless Sensor Networks”, Communications of the ACM, 47(6), 53-57, 2004.
10. Introduction to side channel attacks – http://gauss.ececs.uc.edu/Courses/c653/lectures/SideC/intro.pdf.