Page 64 - B.Tech IT Curriculum and Syllabus R2017 - REC
P. 64
Department of IT, REC
OUTCOMES:
Upon successful completion of this course, Students shall be able to
1. Apply the fundamental concepts of computational Intelligence.
2. Develop rule based systems and fuzzy expert systems
3. Implement the concepts of artificial neural networks.
4. Analyze how evolutionary computations are employed to various applications.
5. Design hybrid intelligent systems.
CS17504 CRYPTOGRAPHY AND NETWORK SECURITY L T P C
3 0 0 3
OBJECTIVES:
The student should be made to:
● Basics of encryption and Number Theory.
● Methods of public key encryption.
● Authentication and hash functions.
● Techniques of system level securities.
● Current trends on wireless security.
UNIT I INTRODUCTION & NUMBER THEORY 9
Services, Mechanisms and attacks-the OSI security architecture-Network security model-Classical
Encryption techniques (Symmetric cipher model, substitution techniques, transposition techniques,
steganography)-Finite Fields and Number Theory: Modular arithmetic- Euclid‘s algorithm-Finite
fields- Polynomial Arithmetic –Prime numbers-Fermat‘s and Euler‘s theorem- Testing for primality -
The Chinese Remainder theorem- Discrete logarithms.
UNIT II BLOCK CIPHERS & PUBLIC KEY CRYPTOGRAPHY 9
Data Encryption Standard-Block cipher principles-block cipher modes of operation-Advanced
Encryption Standard (AES)-Triple DES. Public key cryptography: Principles of public key
cryptosystems-The RSA algorithm-Key management-Attacks on RSA - Diffie Hellman Key
exchange- Elliptic curve arithmetic-Elliptic curve cryptography - Side channel analysis- side channel
attacks.
UNIT III HASH FUNCTIONS AND DIGITAL SIGNATURES 9
Authentication requirement – MAC – Hash function – MD5 - SHA - HMAC –-Digital signature and
authentication protocols – DSS– Blockchain - Case Study: Bitcoin – Ethereum – Zcash.
UNIT IV SECURITY PRACTICE & SYSTEM SECURITY 8
Kerberos – X.509 - Firewall types and design - SET - Intrusion detection system – Malicious
software- Antivirus: introduction - signatures - current trends in antivirus protection
UNIT V E-MAIL, IP, WEB & WIRELESS LAN SECURITY 10
E-mail Security: Pretty Good Privacy-S/MIME. IPSecurity: Overview of IPSec - IP and IPv6-
Authentication Header-Encapsulation Security Payload (ESP)-Internet Key Exchange (Phases of IKE,
ISAKMP/IKE Encoding). Web Security: SSL/TLS Basic Protocol-computing the keys- client
authentication- Wireless LAN Security: Wi-Fi Protected Access (WPA) .
TOTAL: 45 PERIODS
Curriculum and Syllabus | B.Tech. Information Technology | R2017 Page 64

