Page 64 - B.Tech IT Curriculum and Syllabus R2017 - REC
P. 64

Department of IT, REC


               OUTCOMES:
               Upon successful completion of this course, Students shall be able to
                   1.  Apply the fundamental concepts of computational Intelligence.
                   2.  Develop rule based systems and fuzzy expert systems
                   3.  Implement the concepts of artificial neural networks.
                   4.  Analyze how evolutionary computations are employed to various applications.
                   5.  Design hybrid intelligent systems.


               CS17504               CRYPTOGRAPHY AND NETWORK SECURITY                         L T P C
                                                                                                                                                   3  0  0  3

                OBJECTIVES:
               The student should be made to:
                   ●  Basics of encryption and Number Theory.
                   ●  Methods of public key encryption.
                   ●  Authentication and hash functions.
                   ●  Techniques of system level securities.
                   ●  Current trends on wireless security.

               UNIT I         INTRODUCTION & NUMBER THEORY                                              9
               Services,  Mechanisms  and  attacks-the  OSI  security  architecture-Network  security  model-Classical
               Encryption  techniques  (Symmetric  cipher  model,  substitution  techniques,  transposition  techniques,
               steganography)-Finite  Fields  and  Number  Theory:  Modular  arithmetic-  Euclid‘s  algorithm-Finite
               fields- Polynomial Arithmetic –Prime numbers-Fermat‘s and Euler‘s theorem- Testing for primality -
               The Chinese Remainder theorem- Discrete logarithms.


               UNIT II          BLOCK CIPHERS & PUBLIC KEY CRYPTOGRAPHY                                 9
               Data  Encryption  Standard-Block  cipher  principles-block  cipher  modes  of  operation-Advanced
               Encryption  Standard  (AES)-Triple  DES.  Public  key  cryptography:  Principles  of  public  key
               cryptosystems-The  RSA  algorithm-Key  management-Attacks  on  RSA  -  Diffie  Hellman  Key
               exchange- Elliptic curve arithmetic-Elliptic curve cryptography - Side channel analysis- side channel
               attacks.

               UNIT III        HASH FUNCTIONS AND DIGITAL SIGNATURES                                    9
               Authentication requirement – MAC – Hash function – MD5 - SHA - HMAC –-Digital signature and
               authentication protocols – DSS– Blockchain - Case Study: Bitcoin – Ethereum – Zcash.

               UNIT IV        SECURITY PRACTICE & SYSTEM SECURITY                                       8
               Kerberos  –  X.509  -  Firewall  types  and  design  -  SET  -  Intrusion  detection  system  –  Malicious
               software- Antivirus: introduction - signatures - current trends in antivirus protection

               UNIT V          E-MAIL, IP, WEB & WIRELESS LAN SECURITY                                  10
               E-mail  Security:  Pretty  Good  Privacy-S/MIME.  IPSecurity:  Overview  of  IPSec  -  IP  and  IPv6-
               Authentication Header-Encapsulation Security Payload (ESP)-Internet Key Exchange (Phases of IKE,
               ISAKMP/IKE  Encoding).  Web  Security:  SSL/TLS  Basic  Protocol-computing  the  keys-  client
               authentication- Wireless LAN Security: Wi-Fi Protected Access (WPA) .

                                                                                    TOTAL: 45 PERIODS





               Curriculum and Syllabus | B.Tech. Information Technology | R2017                Page 64
   59   60   61   62   63   64   65   66   67   68   69