Page 100 - R2017-REC-ECE-UG Syllabus
P. 100

Department of ECE, REC




                UNIT II          BLOCK CIPHERS & PUBLIC KEY CRYPTOGRAPHY                                9
                Data  Encryption  Standard-Block  cipher  principles-block  cipher  modes  of  operation-AdvancedEncryption
                Standard  (AES)-Triple  DES.  Public  key  cryptography:  Principles  of  public  key  cryptosystems-The  RSA
                algorithm-Key  management-Attacks  on  RSA  -  Diffie  Hellman  Key  exchange-  Elliptic  curve  arithmetic-
                Elliptic curve cryptography - Side channel analysis- side channel attacks.
                UNIT III        HASH FUNCTIONS AND DIGITAL SIGNATURES                                     9
                Authentication  requirement  –  MAC  –  Hash  function  –  MD5  -  SHA  -  HMAC  –-Digital  signature  and
                authentication protocols – DSS– Blockchain - Case Study: Bitcoin – Ethereum – Zcash.

                UNIT IV        SECURITY PRACTICE & SYSTEM SECURITY                                    8
                Kerberos  –  X.509  -  Firewall  types  and  design  -  SET  -  Intrusion  detection  system  –  Malicious  software  -
                Antivirus: introduction - signatures - current trends in antivirus protection

                UNIT V          E-MAIL, IP, WEB & WIRELESS LAN SECURITY                                  10
                E-mail Security: Pretty Good Privacy-S/MIME. IPSecurity: Overview of IPSec - IP and IPv6-Authentication
                Header-Encapsulation  Security  Payload  (ESP)-Internet  Key  Exchange  (Phases  of  IKE,  ISAKMP/IKE
                Encoding). Web Security: SSL/TLS Basic Protocol-computing the keys- client authentication- Wireless LAN
                Security: Wi-Fi Protected Access (WPA).

                                                                                    TOTAL= 45 PERIODS
                OUTCOMES:
                At the end of the course, the student should be able to:
                ●The methods of conventional encryption and Number Theory.
                ●The concepts of Public Key Encryption.
                ●Methodology for Authentication and Hashing.
                ●Comprehending System Level Securities.
                ●Perceiving Wireless Security.


                TEXT BOOKS:
                      1.  William Stallings , Cryptography and Network Security-Principles and Practices, Seventh Edition,
                         Pearson Education, 2017
                      2.  Christo Paar and Jan Pelzl ,Understanding Cryptography: A Textbook for Students and Practioners,
                         First Edition, Springer, 2010

                REFERENCES:
                      1.  Yehuda Lindell and Jonathan Katz, Introduction to Modern Cryptography, Second Edition, CRC
                         Press, 2015
                      2.  Bruce  Schneier  ,  Applied  Cryptography:  Protocols,  Algorithms  and  Source  Code  in  C,  Special
                         Edition, Wiley, 2015
                      3.  AtulKahaet, Cryptography and Network Security, Third Edition, Tata McGraw-Hill, 2013
                      4.  Imran Bashir, Mastering Blockchain: Deeper insights into decentralization, cryptography, bitcoin
                         and popular Blockchain frameworks, First Edition, Packt, 2017.
                      5.  JoxeanKoret and Elias Bachaalany, The Antivirus Hackers Handbook, First Edition, Wiley, 2015



                EC17E82           MULTIMEDIA COMPRESSION AND COMMUNICATION                        LT P C

                Curriculum and Syllabus | B.E. Electronics and Communication Engineering | R2017     Page 100
   95   96   97   98   99   100   101   102   103   104   105