Trending: Anna University 8th Sem Results April 2014 May/June 2014 Time Table/ Internal Marks Calculate CGPA Online SSLC Results 2014 12th Result 2014

Test Footer 1

Thursday, June 28, 2012

EC2035 CRYPTOGRAPHY AND NETWORK SECURITY SYLLABUS | ANNA UNIVERSITY BE ECE 7TH SEMESTER SYLLABUS REGULATION 2008 2011-2012

Latest: TNEA 2014 Engineering Application Status, Counselling Date, Rank List

EC2035 CRYPTOGRAPHY AND NETWORK SECURITY SYLLABUS | ANNA UNIVERSITY BE ECE 7TH SEMESTER SYLLABUS REGULATION 2008 2011-2012 BELOW IS THE ANNA UNIVERSITY SEVENTH SEMESTER BE ELECTRONICS AND COMMUNICATION ENGINEERING DEPARTMENT SYLLABUS IT IS APPLICABLE FOR ALL STUDENTS ADMITTED IN THE YEAR 2011-2012 (ANNA UNIVERSITY CHENNAI,TRICHY,MADURAI,TIRUNELVELI,COIMBATORE), 2008 REGULATION OF ANNA UNIVERSITY CHENNAI AND STUDENTS ADMITTED IN ANNA UNIVERSITY CHENNAI DURING 2009
EC2035 CRYPTOGRAPHY AND NETWORK SECURITY L T P C
3 0 0 3
96
AIM
To understand the principles of encryption algorithms; conventional and public key
cryptography. To have a detailed knowledge about authentication, hash functions and
application level security mechanisms.
OBJECTIVES
 To know the methods of conventional encryption.
 To understand the concepts of public key encryption and number theory
 To understand authentication and Hash functions.
 To know the network security tools and applications.
 To understand the system level security used.
UNIT I INTRODUCTION 10
OSI Security Architecture - Classical Encryption techniques – Cipher Principles – Data
Encryption Standard – Block Cipher Design Principles and Modes of Operation -
Evaluation criteria for AES – AES Cipher – Triple DES – Placement of Encryption
Function – Traffic Confidentiality
UNIT II PUBLIC KEY CRYPTOGRAPHY 10
Key Management - Diffie-Hellman key Exchange – Elliptic Curve Architecture and
Cryptography - Introduction to Number Theory – Confidentiality using Symmetric
Encryption – Public Key Cryptography and RSA.
UNIT III AUTHENTICATION AND HASH FUNCTION 9
Authentication requirements – Authentication functions – Message Authentication Codes
– Hash Functions – Security of Hash Functions and MACs – MD5 message Digest
algorithm - Secure Hash Algorithm – RIPEMD – HMAC Digital Signatures –
Authentication Protocols – Digital Signature Standard
UNIT IV NETWORK SECURITY 8
Authentication Applications: Kerberos – X.509 Authentication Service – Electronic Mail
Security – PGP – S/MIME - IP Security – Web Security.
UNIT V SYSTEM LEVEL SECURITY 8
Intrusion detection – password management – Viruses and related Threats – Virus
Counter measures – Firewall Design Principles – Trusted Systems.
TOTAL : 45 PERIODS
TEXT BOOKS
1. William Stallings, “Cryptography And Network Security – Principles and Practices”,
Pearson Education, Third Edition, 2003.
2. Behrouz A. Foruzan, “Cryptography and Network Security”, Tata McGraw-Hill, 2007
REFERENCES
1. Bruce Schneier, “Applied Cryptography”, John Wiley & Sons Inc, 2001.
97
2. Charles B. Pfleeger, Shari Lawrence Pfleeger, “Security in Computing”, Third Edition,
Pearson Education, 2003
3. Wade Trappe and Lawrence C. Washington , “ Introduction to Cryptography with
4. coding theory” , Pearson Education, 2007.
5. Wenbo Mao, “ Modern Cryptography Theory and Practice” , Pearson Education,
2007
6. Thomas Calabrese, “Information Security Intelligence : Cryptographic Principles and
Applications”, Thomson Delmar Learning,2006.
7. Atul Kahate, “Cryptography and Network Security”, Tata McGraw-Hill, 2003.

No comments:

Post a Comment

Any doubt ??? Just throw it Here...