Page 55 - B.E CSE Curriculum and Syllabus R2017 - REC
P. 55

Department of CSE, REC



            OUTCOMES:
            On successful completion of this course, the student will be able to:
               ●  Understand applications of Graphics and basic primitives of graphics,
               ●  Gain proficiency in various algorithms of 2D Computer graphics and trend their use in various real-
                   life systems.
               ●  Enhance the perspective of Modern computer system with modelling, analysis and interpretation of
                   3D visual information.
               ●  Apply Illumination, color models and design animation sequences.
               ●  Able to understand different forms of Multimedia and gain knowledge about Audio and Video.

            TEXT BOOKS:
               1.  Donald  Hearn  and  M.  Pauline  Baker,  Computer  Graphics  C  Version,  Second  Edition,  Pearson
                   Education.
               2.  Prabat K Andleigh and Kiran Thakrar, Multimedia Systems and Design, PHI, First Edition, 2003

            REFERENCES:
               1.  John F. Hughes, Andries Van Dam, Morgan McGuire, David F. Sklar, James D. Foley, Steven K.
                   Feiner and Kurt Akeley, Computer Graphics: Principles and Practice, Third Edition, Addison-Wesley
                   Professional,2013.
               2.  John F. Koegel Buford, Multimedia Systems, Pearson Education, Delhi, Sixth Edition, 2009
               3.  Ralf  Steinmetz  and  Klara  Multimedia  Computing,  Communications  and  Applications,  Pearson
                   Education, First Edition, 2009
               4.  http://nptel.ac.in/



            CS17504                             CRYPTOGRAPHY AND NETWORK SECURITY                    L T P C
                                                                   (Common to B.E. CSE and B.Tech. IT)                                3 0 0 3


              OBJECTIVES:
               ●  Basics of encryption and Number Theory.
               ●  Methods of public key encryption.
               ●  Authentication and hash functions.
               ●  Techniques of system level securities.
               ●  Current trends on wireless security.

            UNIT I        INTRODUCTION & NUMBER THEORY                                                              9
            Services, Mechanisms and attacks-the OSI security architecture-Network security model-Classical Encryption
            techniques (Symmetric cipher model, substitution techniques, transposition techniques, steganography)-Finite
            Fields and Number Theory: Modular arithmetic- Euclid’s algorithm-Finite fields- Polynomial Arithmetic  –
            Prime  numbers-Fermat’s  and  Euler’s  theorem-  Testing  for  primality  -The  Chinese  Remainder  theorem-
            Discrete logarithms.

            UNIT II          BLOCK CIPHERS & PUBLIC KEY CRYPTOGRAPHY                                     9
            Data  Encryption  Standard-Block  cipher  principles-block  cipher  modes  of  operation-Advanced  Encryption
            Standard  (AES)-Triple  DES.  Public  key  cryptography:  Principles  of  public  key  cryptosystems-The  RSA
            algorithm-Key  management-Attacks  on  RSA  -  Diffie  Hellman  Key  exchange-  Elliptic  curve  arithmetic-
            Elliptic curve cryptography - Side channel analysis- side channel attacks.

            UNIT III        HASH FUNCTIONS AND DIGITAL SIGNATURES                                             9
            Authentication  requirement  –  MAC  –  Hash  function  –  MD5  -  SHA  -  HMAC  –-Digital  signature  and
            authentication protocols – DSS– Blockchain - Case Study: Bitcoin – Ethereum – Zcash.

            Curriculum and Syllabus | B.E. Computer Science and Engineering | R2017                    Page 55
   50   51   52   53   54   55   56   57   58   59   60