Information Securtiy

Learning Outcomes: 
After learning the course the students should be able to
• Understand the principles and practices of cryptographic techniques.
• Understand a variety of generic security threats and vulnerabilities, and identify & analyse particular security problems for given application.
• Appreciate the application of security techniques and technologies in solving real-life security problems in practical systems.
• Apply appropriate security techniques to solve security problem.
Syllabus: 
Unit NoTopics
1

Introduction

Information Security understanding,Security goals, Security attacks, Security services, security mechanisms

2

Cryptographic Mathematics

Modular arithmetic, linear congruence, Algebraic structure, checking of primeness, quadratic congruence

3

Classical Ciphers

Symmetric cipher model, substitution ciphers, transposition ciphers, steganography

4

Modern symmetric key ciphers

Modern block ciphers, modern stream ciphers, Data Encryption standard, advanced encryption standard, Electronic code book mode, CBC, cipher feedback mode, output feedback mode

5

Public key cryptography

RSA, RSA proof, RSA attacks, Rabin cryptosystem, Key management: Diffie Hellman

6

Message Authentication and Hash functions

Authentication requirements, functions, Message authentication codes (MAC), Hash functions, security of Hash functions

7

Hash algorithms, Digital Signatures

SHA- 512, Basics, digital signature standards

8

Network and System Security

Understanding of Worm s, Virus, Trojan Horse, Malwares, IP and Network Security ,Web security Email Security, System Security, tools

9

Case Studies (Self Study topics)

Cyber Security, Laws, Cyber security amendments, Block Chain ,Security compliances 

Text Books: 
Name : 
Cryptography and Network Security – Principles and Practice
Author: 
William Stallings:
Edition: 
4th
Reference Books: 
Name: 
Applied Cryptography
Author: 
Bruce Scheneir
Publication: 
John Wiley, 1996
Edition: 
2nd
Name: 
Cryptography & Network Security
Author: 
Behrouz Forouzan
Publication: 
TMH
Edition: 
1/E,2007
Syllabus PDF: 
AttachmentSize
PDF icon Information Security.pdf225.03 KB
branch: 
CBA
BDA
MA
Course: 
2018
Stream: 
B.Tech