EL4004 Cryptography and Network Security Syllabus:
EL4004 Cryptography and Network Security Syllabus โ Anna University PG Syllabus Regulation 2021
COURSE OBJECTIVES:
๏ท To understandโ the importance and goals of communication network and information security and introduce them to the different types of attacks.
๏ท To expose different approaches to handling security and the algorithms in use for maintaining data integrity and authenticity.
๏ท Toโ appreciate the practical aspects of security features design and their implementation in wired and wireless internetworking domains.
UNIT I INTRODUCTION ON SECURITY
Security Goals, Cryptographic attacks, Security services and mechanisms Techniques: Cryptography and Steganography, Traditional Symmetric-Key Ciphers: Substitution Ciphers and Transposition Ciphers, Mathematics for Cryptography.
UNIT II SYMMETRIC & ASYMMETRIC KEY ALGORITHMS
Introduction to Block Ciphers and Stream Ciphers, Data Encryption Standards (DES), Advanced Encryption Standard (AES), RC4, Principle of asymmetric key algorithms, RSA Cryptosystem.
UNIT III INTEGRITY, AUTHENTICATION AND KEY MANAGEMENT
Message Integrity, Hash functions: SHA 512, Whirlpool, Digital signatures: Digital signature standards. Authentication: Entity Authentication: Biometrics, Key management Techniques.
UNIT IV NETWORK SECURITY, FIREWALLS AND WEB SECURITY
Introduction on Firewalls, Types of Firewalls, IP Security, E-mail security: PGP- S/MIME, Web security: SSL-TLS, SET.
UNIT V WIRELESS NETWORK SECURITY
Security Attack issues specific to Wireless systems: Worm hole, Tunneling, DoS. Security for WLAN, Security for Broadband networks: Security challenges in 4G and 5G deployments, Introduction to side channel attacks and their counter measures.
COURSE OUTCOMES:
Upon completion of this course, the students will be
CO1:Able to demonstrate an understanding of the ways in which communication network security may get compromised and the basic principles of security algorithm design.
CO2:Familiar with the different types of security attacks, approaches to handling security and the algorithms in use for maintaining data integrity and authenticity
CO3:Able to implement and analyse the different algorithms and compare their performances.
CO4:Able to appreciate the practical aspects of security features design and their implementation in wired and wireless internetworking domains
CO5:In a position to apply his knowledge for designing or modifying existing algorithms and implementing using simulation.
TOTAL:45 PERIODS
REFERENCES
1. Behrouz A. Forouzan ,โCryptography and Network securityโ, McGraw- Hill, 2011
2. William Stallings, โCryptography and Network security: principles and practiceโ, Prentice Hall of India, New Delhi, 2nd Edition,2002
3. AtulKahate ,โCryptography and Network securityโ, Tata McGraw-Hill,2nd Edition, 2008.
4. R.K.Nichols and P.C. Lekkas ,โWireless Security: Models , threats and Solutionsโ, McGraw- Hill, 2001.
5. H. Yang et al., โSecurity in Mobile Ad Hoc Networks: Challenges and Solutionโ, IEEE Wireless Communications, Feb. 2004.
6. โSecuring Ad Hoc Networksโ, IEEE Network Magazine, vol. 13, no. 6, pp. 24-30, December 1999.
7. โSecurity of Wireless Ad Hoc Networks,โ http://www.cs.umd.edu/~aram/wireless/ survey.pdf
8. David Boelet.al,โSecuring Wireless Sensor Networks โ Security Architectureโ, Journal of networks , Vol.3. No. 1. pp. 65 -76, Jan 2008.
9. Perrig, A., Stankovic, J., Wagner, D., โSecurity in Wireless Sensor Networksโ, Communications of the ACM, 47(6), 53-57, 2004.
10. Introduction to side channel attacks โ http://gauss.ececs.uc.edu/Courses/c653/lectures/SideC/intro.pdf.