2CSE602: Information Security

Learning Outcomes: 
After learning the course the students should be able to
Understand the principles and practices of cryptographic techniques.
Understand a variety of generic security threats and vulnerabilities, and identify & analyze particular security problems for given application.
Appreciate the application of security techniques and technologies in solving real-life security problems in practical systems.
Apply appropriate security techniques to solve security problem
Syllabus: 
Unit NoTopics
Introduction

Security goals, attacks, Security services, security mechanisms

Cryptographic Mathematics

Modular arithmetic, linear congruence, Algebraic structure, checking of primeness, primality testing, Chinese remainder theorem, quadratic congruence

Classical Ciphers

Symmetric cipher model, substitution ciphers, transposition ciphers, steganography 

Modern symmetric key ciphers

Modern block ciphers, modern stream ciphers, Data Encryption standard, advanced encryption standard, Electronic code book mode, CBC, cipher feedback mode, output feedback mode

Public key cryptography

RSA, RSA proof, RSA attacks, Rabin cryptosystem, Key management: Diffie Hellman

Message Authentication and Hash functions

Authentication requirements, functions, Message authentication codes (MAC), Hash functions, security of Hashfunctions

Hash algorithms

SHA- 512

Digital Signatures

Basics, digital signature standards

IP Security
Reference Books: 
Name: 
Cryptography and Network Security – Principles and Practice
Author: 
William Stallings
Edition: 
4/E, Pearson Education, 2005.
Name: 
Applied Cryptography
Author: 
Bruce Scheneir
Edition: 
2/E, John Wiley, 1996.
Name: 
Cryptography & Network Security
Author: 
Behrouz Forouzan
Edition: 
1/E, TMH, 2007
Syllabus PDF: 
AttachmentSize
PDF icon 6th Information Security.pdf245.35 KB
branch: 
CBA
BDA
MA
Course: 
2014
2016
Stream: 
B.Tech