Home About Us Departments Curriculum Facilities Alumni Examination Branch
 
 
M.Sc(IS) -> MSc(IS) -> Ist Year-> IInd Semester
 
NETWORK SECURITY

Unit – I

Cryptography – Terminology, Steganography, Substitution ciphers and transposition ciphers, one – time pads.

Cryprographic protocols – Introduction, Communication using Symmetric cryptography, one-way hash functions, communication using public-key cryptography, Hybrid cryptosystems, Digital Signatures, Digital Signatures with encryption, Random and Psuedo random sequence generation

Basic Protocols – Key Exchange, Authentication, Authentication and Key exchange, Formal analysis, Secret splitting, Secret sharing, Cryptographic protection of databases

Unit - II

Intermediate Protocols – Time stamping, Subliminal channel, Signatures, Bit commitment, Fair-Coin flops, mental poker, Key Escrow

Advanced Protocols – Zero knowledge proofs, Blind signatures, Identity based Public-key cryptography Oblivious transfer, Simultaneous contract signing, Digital Certified mail, Simultaneous exchange of secrets.
Esoteric Protocols – Secret Electronics, Security multiparty computation, Anonymous Message broadcast, Digital Cash

Unit – III

Key Length – Symmetric Key length, Public-Key length
Key management – Generation, Transfer, Verification, Use, Store, Backup, lifetime, destruction, Public Key Management

Algorithms types and Modes – Electronic codebook, Block reply, Cipher Block Chaining, Steam Ciphers, Self-Synchronizing, Cipher-feedback, Synchronous Stream, Out-put feedback, Counter mode, Choosing a Cipher mode, Comparison.
Using Algorithms – Choosing an algorithm, Public Key Versus Symmetric, Encrypting communication channels, Encrypting data for storage, Hardware Encryption Versus Software.

Unit – IV
Information Theory, Complexity theory, Number Theory, Factoring, Prime Number generation DES – Background, Description, Security of DES, Differential and linear Cryptanalysis, DES variants
Psuedo Random Sequence generators – linear congrential, linear feed-back shift registers Stream Ciphers – Design and Analysis, Stream Cypher using LFSRs

Unit – V

One – Way Hash functions – Background, MD5, SHA
Public – Key Algorithms – Background, RSA
Digital Signature Algorithm
Diffie-Hellman Algorithm for key exchange
Implementation Examples – IBM, ISDN, Kerberos, ISO authentication framework, PEM,PKCS, UEPs.

Suggested reading :
Bruce Schneier – Applied Cryptography, Wiley 2001

References:
William Stallings – Cryptography and Network Security, PH

 

Achievers Placements Newsletter Guest Book Join Us Contact Us
© All Rights Reserved