Sunday, July 8, 2012

CS9402- CRYPTOGRAPHY AND SECURITY-B.E -CSE-COMPUTER SCIENCE AND ENGINEERING SEVENTH-VII SEMESTER 2008 REGULATION ANNA UNIVERSITY SYLLABUS



CSE Computer Science And Engineering VII-Seventh Semester Syllabus 2008 Regulation Anna University


AIM:
To introduce the fundamentals of Cryptography and its application to Security.

OBJECTIVES:
§   To understand the mathematics behind Cryptography
§   To  understand  the  standard  algorithms  used  to  provide  confidentiality  provide integrity and authenticity.
§   To get a working knowledge of network security, data base security and DS security issues in order to build secure systems.

UNIT I           MATHEMATICAL FUNDAMENTALS                                                         9
Security trends Attacks and services Classical crypto systems Different types of ciphers   LFSR  sequences   Basic  Number  theory   Congruences   Chinese Remainder theorem – Modular exponentiation Fermat and Euler's theorem – Legendre and Jacobi symbols Finite fields continued fractions.

UNIT II          ENCRYPTION TECHNIQUES                                                                     9
Simple DES Differential cryptoanalysis DES Modes of operation Triple DES AES RC5, RC4 RSA Attacks Primality test factoring.

UNIT III         KEY EXCHANGE AND AUTHENTICATION TECHNIQUES                      9
Discrete Logarithms Computing discrete logarithms Diffie-Hellman key exchange – Elliptic  curve  cryptography  Key  exchange  ElGamal  Public  key  cryptosystems  Message Authentication codes - Hash functions Hash algorithms - Secure Hash Birthday attacks - MD5 Authentication protocols - Digital signatures RSA, ElGamal, DSA.

UNIT IV        NETWORK SECURITY PRACTICE                                                            9
Authentication applications Kerberos, X.509, PKI Electronic Mail security PGP, S/MIME IP security Web Security SSL, TLS, SET system security.

UNIT V         OPERATING SYSTEMS AND DATABASE SECURITY                          9
Trusted Operating systems security models designing trusted OS assurance Data base security multi-level databases multi-level security.




TEXT BOOKS :

TOTAL: 45 PERIODS

1    Wade Trappe, Lawrence C Washington, Introduction to Cryptography with coding theory, 2nd ed, Pearson, 2007.
2    William  Stallings,  “Cryptography and  Network  security Principles  and Practices, Pearson/PHI, 4th ed, 2006.
3    Pfleeger and Pfleeger, Security in computing, 3rd ed, PHI/Pearson, 2003.

REFERENCES :
1. Wenbo Mao, Modern Cryptography Theory and Practice, Pearson 2004.


7/08/2012 01:54:00 AM

0 comments:

Post a Comment

Related Posts Plugin for WordPress, Blogger...