Skip to Content
Semester 6SyllabusCryptography and Network Security

Cryptography and Network Security

Unit 1: Fundamentals of Cryptography and Block Ciphers

  • Cryptography Basics

    • Objectives of cryptography
    • Security mechanisms and OSI Security Architecture
    • Classical encryption techniques
    • Cipher principles and cryptanalysis
    • Attack models
  • Block Ciphers

    • Design principles and modes of operation
    • Feistel cipher structure
    • Data Encryption Standard (DES)
    • International Data Encryption Algorithm (IDEA)
    • Blowfish and variants of DES
    • Advanced Encryption Standard (AES): Structure, transformation functions, and key expansion

Unit 2: Public Key Cryptography and Key Management

  • Public Key Cryptography

    • Asymmetric key cryptography overview
    • RSA algorithm: Computational aspects and security
    • Elliptic Curve Cryptography (ECC)
    • Knapsack Algorithm
    • Diffie-Hellman Key Exchange
    • Man-in-the-Middle attack
  • Key Management

    • Key management and distribution techniques
    • Symmetric key distribution using symmetric and asymmetric encryption
    • Public key distribution

Unit 3: Hash Functions and Network Security

  • Hash Functions and Message Authentication Codes (MACs)

    • MAC requirements and security
    • MACs based on hash functions
    • Security of hash functions
    • Secure Hash Algorithm (SHA)
    • HMAC
  • Digital Signatures

    • Properties, requirements, and security
    • Digital signature schemes (Elgamal and Schnorr)
    • NIST Digital Signature Algorithm
  • Network Security

    • Authentication applications: Kerberos, X.509 Authentication Service
    • Pretty Good Privacy (PGP)

Unit 4: IP and System Security

  • IP and Web Security

    • IPSec architecture, applications, and benefits
    • IPSec protocols
    • Web security threats
    • Secure Socket Layer (SSL)
    • Secure Electronic Transaction (SET)
  • System Level Security

    • Intrusion detection systems (IDS)
    • Viruses and related threats
    • Virus countermeasures
    • Firewall design principles
    • Trusted systems
Last updated on