Course code: PEC-CSE-411G
Category: Professional Elective Course
Course title: Network Security and Cryptography
Scheme and Credits
| L | T | P | Credits | |
|---|---|---|---|---|
| Semester 7 | 3 | 0 | 0 | 3 |
| Marks | |
|---|---|
| Class work | 25 |
| Exam | 75 |
| Total | 100 |
| Duration of Exam | 03 Hours |
Objective of the course:
- To understand cryptography theories; algorithms & systems.
- To understand the symmetric and asymmetric key algorithms.
- To understand necessary approaches & techniques to build protection mechanisms in order to secure Computer Networks.
- Acquire fundamental knowledge on the concepts of different security layers.
Note: Examiner will set nine questions in total. Question one will be compulsory. Question one will have 6 parts of 2.5 marks each from all units and remaining eight questions of 15 marks each to be set by taking two questions from each unit. The students have to attempt five questions in total, first being compulsory and selecting one from each unit.
UNIT 1
Introduction
Plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography.
UNIT 2
Symmetric Key Algorithms
Introduction, algorithms types and modes, DES, AES.
Asymmetric Key Algorithms
Introduction, history of asymmetric key cryptography, RSA symmetric and asymmetric key cryptography together, Digital signature.
UNIT 3
Internet Security Protocols
Basic concepts, Secure Socket Layer (SSL), Transport Layer Security (TLS), Secure Hyper Text Transfer protocol (SHTTP), Time Stamping Protocol (TSP), Secure Electronic Transaction (SET), SSL versus SET, Electronic Money, Email Security.
UNIT 4
User Authentication And Kerberos
Introduction, Authentication basics, Passwords, authentication tokens, certificate based authentication, biometric based authentication, Kerberos, key distribution center (KDC), Security handshake pitfalls, single Sign on (SSO) approach.
Suggested Text Books
- Cryptography and Network Security, 2nd Edition by Atul Kahate, TMH
- Network Management Principles & Practices by Subramanian, Mani (AWL)
- SNMP, Stalling, Willian (AWL)
Suggested Reference Books
- SNMP: A Guide to Network Management (MGH)
- Telecom Network Management by H.H. Wang (MGH)
- Network Management by U. Dlack (MGH)
Course Outcomes
After completing the course the student will be able to:
- Compare various cryptographic techniques.
- Work with symmetric & asymmetric key algorithms.
- Design secure applications.
- Inject secure coding in the developed applications.