The document outlines the objectives and content of a cryptography course. The objectives are to understand cryptography theories, algorithms, systems and approaches to secure computer networks. The course content includes introduction to cryptography concepts, symmetric and asymmetric key ciphers like DES, AES, RSA and algorithms like SHA. It also covers hash functions, digital signatures, key management, network and internet security topics like PGP, S/MIME, IP security and wireless network security. The lab component involves experiments on encryption/decryption algorithms like Caesar cipher, DES, RSA and Diffie-Hellman key exchange.
The document outlines the objectives and content of a cryptography course. The objectives are to understand cryptography theories, algorithms, systems and approaches to secure computer networks. The course content includes introduction to cryptography concepts, symmetric and asymmetric key ciphers like DES, AES, RSA and algorithms like SHA. It also covers hash functions, digital signatures, key management, network and internet security topics like PGP, S/MIME, IP security and wireless network security. The lab component involves experiments on encryption/decryption algorithms like Caesar cipher, DES, RSA and Diffie-Hellman key exchange.
The document outlines the objectives and content of a cryptography course. The objectives are to understand cryptography theories, algorithms, systems and approaches to secure computer networks. The course content includes introduction to cryptography concepts, symmetric and asymmetric key ciphers like DES, AES, RSA and algorithms like SHA. It also covers hash functions, digital signatures, key management, network and internet security topics like PGP, S/MIME, IP security and wireless network security. The lab component involves experiments on encryption/decryption algorithms like Caesar cipher, DES, RSA and Diffie-Hellman key exchange.
The document outlines the objectives and content of a cryptography course. The objectives are to understand cryptography theories, algorithms, systems and approaches to secure computer networks. The course content includes introduction to cryptography concepts, symmetric and asymmetric key ciphers like DES, AES, RSA and algorithms like SHA. It also covers hash functions, digital signatures, key management, network and internet security topics like PGP, S/MIME, IP security and wireless network security. The lab component involves experiments on encryption/decryption algorithms like Caesar cipher, DES, RSA and Diffie-Hellman key exchange.
Download as DOCX, PDF, TXT or read online from Scribd
Download as docx, pdf, or txt
You are on page 1of 2
OBJECTIVES:
l To understand Cryptography Theories, Algorithms and Systems.
l To understand necessary Approaches and Techniques to build protection mechanisms in order to secure computer networks. l To understand Cryptography Theories, Algorithms and Systems. UNIT I INTRODUCTION 9 Introduction, The need for security, Security approaches, Principles of security, Types of Security attacks, Security services, Security Mechanisms, A model for Network Security (Text 1) Cryptography Concepts and Techniques: Introduction, plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography, steganography, key range and key size, possible types of attacks.(Text 2) UNIT II: SYMMETRIC KEY CIPHERS 9 Block Cipher principles, DES, AES, Blowfish, RC5, IDEA, Block cipher operation(Text 1), Stream ciphers, RC4. Asymmetric key Ciphers: Principles of public key cryptosystems, RSA algorithm, Elgamal Cryptography, Diffie-Hellman Key Exchange, Knapsack Algorithm. (Text2) UNIT III CRYPTOGRAPHIC HASH FUNCTIONS 9 (Text 1) Message Authentication, Secure Hash Algorithm (SHA-512), Message authentication codes: Authentication requirements, HMAC, CMAC, Digital signatures, Elgamal Digital Signature Scheme. Key Management and Distribution: Symmetric Key Distribution Using Symmetric & Asymmetric Encryption, Distribution of Public Keys, Kerberos, X.509 Authentication Service, Public – Key Infrastructure.(Text 1) UNIT IV NETWORK AND INTERNET SECURITY 9 Electronic Mail security – PGP, S/MIME – IP security – Web Security - SYSTEM SECURITY: Intruders – Malicious software – viruses – Firewalls - Network Access Control and Cloud Security – Transport Level Security – Wireless Network Security – Email Security – IP Security. UNIT V LAB COMPONENT – LIST OF EXPERIMENTS 24 1. Write a C program that contains a string (char pointer) with a value \Hello World’. The program should XOR each character in this string with 0 and displays the result. 2. Write a C program that contains a string (char pointer) with a value \Hello World’. The program should AND or and XOR each character in this string with 127 and display the result. 3. Write a Java program to perform encryption and decryption using the following algorithms: a)Ceaser Cipher b) Substitution Cipher c) Hill Cipher 4. Write a Java program to implement the DES algorithm logic 5. Write a Java program to implement RSA Algoithm 6. Implement the Diffie-Hellman Key Exchange mechanism using HTML and JavaScript. Consider the end user as one of the parties (Alice) and the JavaScript application as other party (bob).
Echo on a Chip - Secure Embedded Systems in Cryptography: A New Perception for the Next Generation of Micro-Controllers handling Encryption for Mobile Messaging