NSCSemester 7

Network Security and Cryptography Syllabus

Complete syllabus for Network Security and Cryptography - PEC-CSE-411G

Author: Deepak Modi
Last Updated: 2025-06-15

Course code: PEC-CSE-411G
Category: Professional Elective Course
Course title: Network Security and Cryptography

Scheme and Credits

LTPCredits
Semester 73003
Marks
Class work25
Exam75
Total100
Duration of Exam03 Hours

Objective of the course:

  • To understand cryptography theories; algorithms & systems.
  • To understand the symmetric and asymmetric key algorithms.
  • To understand necessary approaches & techniques to build protection mechanisms in order to secure Computer Networks.
  • Acquire fundamental knowledge on the concepts of different security layers.

Note: Examiner will set nine questions in total. Question one will be compulsory. Question one will have 6 parts of 2.5 marks each from all units and remaining eight questions of 15 marks each to be set by taking two questions from each unit. The students have to attempt five questions in total, first being compulsory and selecting one from each unit.

UNIT 1

Introduction

Plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography.

UNIT 2

Symmetric Key Algorithms

Introduction, algorithms types and modes, DES, AES.

Asymmetric Key Algorithms

Introduction, history of asymmetric key cryptography, RSA symmetric and asymmetric key cryptography together, Digital signature.

UNIT 3

Internet Security Protocols

Basic concepts, Secure Socket Layer (SSL), Transport Layer Security (TLS), Secure Hyper Text Transfer protocol (SHTTP), Time Stamping Protocol (TSP), Secure Electronic Transaction (SET), SSL versus SET, Electronic Money, Email Security.

UNIT 4

User Authentication And Kerberos

Introduction, Authentication basics, Passwords, authentication tokens, certificate based authentication, biometric based authentication, Kerberos, key distribution center (KDC), Security handshake pitfalls, single Sign on (SSO) approach.

Suggested Text Books

  1. Cryptography and Network Security, 2nd Edition by Atul Kahate, TMH
  2. Network Management Principles & Practices by Subramanian, Mani (AWL)
  3. SNMP, Stalling, Willian (AWL)

Suggested Reference Books

  1. SNMP: A Guide to Network Management (MGH)
  2. Telecom Network Management by H.H. Wang (MGH)
  3. Network Management by U. Dlack (MGH)

Course Outcomes

After completing the course the student will be able to:

  • Compare various cryptographic techniques.
  • Work with symmetric & asymmetric key algorithms.
  • Design secure applications.
  • Inject secure coding in the developed applications.

Found an error or want to contribute?

This content is open-source and maintained by the community. Help us improve it!