Page 100 - R2017-REC-ECE-UG Syllabus
P. 100
Department of ECE, REC
UNIT II BLOCK CIPHERS & PUBLIC KEY CRYPTOGRAPHY 9
Data Encryption Standard-Block cipher principles-block cipher modes of operation-AdvancedEncryption
Standard (AES)-Triple DES. Public key cryptography: Principles of public key cryptosystems-The RSA
algorithm-Key management-Attacks on RSA - Diffie Hellman Key exchange- Elliptic curve arithmetic-
Elliptic curve cryptography - Side channel analysis- side channel attacks.
UNIT III HASH FUNCTIONS AND DIGITAL SIGNATURES 9
Authentication requirement – MAC – Hash function – MD5 - SHA - HMAC –-Digital signature and
authentication protocols – DSS– Blockchain - Case Study: Bitcoin – Ethereum – Zcash.
UNIT IV SECURITY PRACTICE & SYSTEM SECURITY 8
Kerberos – X.509 - Firewall types and design - SET - Intrusion detection system – Malicious software -
Antivirus: introduction - signatures - current trends in antivirus protection
UNIT V E-MAIL, IP, WEB & WIRELESS LAN SECURITY 10
E-mail Security: Pretty Good Privacy-S/MIME. IPSecurity: Overview of IPSec - IP and IPv6-Authentication
Header-Encapsulation Security Payload (ESP)-Internet Key Exchange (Phases of IKE, ISAKMP/IKE
Encoding). Web Security: SSL/TLS Basic Protocol-computing the keys- client authentication- Wireless LAN
Security: Wi-Fi Protected Access (WPA).
TOTAL= 45 PERIODS
OUTCOMES:
At the end of the course, the student should be able to:
●The methods of conventional encryption and Number Theory.
●The concepts of Public Key Encryption.
●Methodology for Authentication and Hashing.
●Comprehending System Level Securities.
●Perceiving Wireless Security.
TEXT BOOKS:
1. William Stallings , Cryptography and Network Security-Principles and Practices, Seventh Edition,
Pearson Education, 2017
2. Christo Paar and Jan Pelzl ,Understanding Cryptography: A Textbook for Students and Practioners,
First Edition, Springer, 2010
REFERENCES:
1. Yehuda Lindell and Jonathan Katz, Introduction to Modern Cryptography, Second Edition, CRC
Press, 2015
2. Bruce Schneier , Applied Cryptography: Protocols, Algorithms and Source Code in C, Special
Edition, Wiley, 2015
3. AtulKahaet, Cryptography and Network Security, Third Edition, Tata McGraw-Hill, 2013
4. Imran Bashir, Mastering Blockchain: Deeper insights into decentralization, cryptography, bitcoin
and popular Blockchain frameworks, First Edition, Packt, 2017.
5. JoxeanKoret and Elias Bachaalany, The Antivirus Hackers Handbook, First Edition, Wiley, 2015
EC17E82 MULTIMEDIA COMPRESSION AND COMMUNICATION LT P C
Curriculum and Syllabus | B.E. Electronics and Communication Engineering | R2017 Page 100

