Download Cryptography and Network Security

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Wireless security wikipedia , lookup

Distributed firewall wikipedia , lookup

Computer security wikipedia , lookup

Transcript
With effect from the academic year 2015-16
IT 5104
CRYPTOGRAPHY AND NETWORK SECURITY
Instruction
3 Periods per Week
Duration of University Examination
3 Hours
University Examination
80 Marks
Sessional
20 Marks
Course objectives:
1. To understand security threats, security services and mechanisms.
2. To understand different symmetric and asymmetric cryptography algorithms.
3. To understand network and email security protocols like SSL, PGP and S/MIME
Course outcomes:
Student will be able to
1. Demonstrate detailed knowledge of the role of cryptography to protect data.
2. Identify common network security vulnerabilities/attacks.
UNIT-I
Introduction: Attributes of Security, Integrity, Authenticity, Non-repudiation, Confidentiality,
Authorization, Anonymity, Types of Attacks, DoS, IP Spoofing, Replay, Man-in-the-Middle
attacks, General Threats to Computer Network, Worms, Viruses, Trojans
UNIT-II
Secret Key Cryptography: DES, Triple DES, AES, Key distribution, Attacks
Public Key Cryptography: RSA, ECC, Key Exchange (Diffie-Hellman), Java Cryptography
Extensions, Attacks.
UNIT-III
Integrity, Authentication and Non-Repudiation: Hash Function (MD5, SHA5), Message
Authentication Code (MAC), Digital Signature (RSA, DSA Signatures), Biometric
Authentication.
UNIT-IV
PKI Interface: Digital Certificates, Certifying Authorities, POP Key Interface, System Security
using Firewalls and VPN's.
Smart Cards: Application Security using Smart Cards, Zero Knowledge Protocols and their use
in Smart Cards, Attacks on Smart Cards.
With effect from the academic year 2015-16
UNIT-V
Applications: Kerberos, Web Security Protocols ( SSL ), IPSec, Electronic Payments, E-cash,
Secure Electronic Transaction (SET), Micro Payments, Case Studies of Enterprise Security
(.NET and J2EE).
Suggested Reading:
1) William Stallings, "Cryptography and Network Security", 5th Edition, Pearson, 2013.
2) Behrouz A Forouzan, "Cryptography and Network Security", TMH, 2009.
3) Joseph MiggaKizza, "A Guide to Computer Network Security ", Springer, 2010.
4) Dario Cataiano, Contemporary Cryptology ", Springer, 2010.
5) William Stallings, "Network Security Essentials: Application and standards", 4th Edition,
Pearson, 2012.