CNS Syllabus

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

OBJECTIVES:

l To understand Cryptography Theories, Algorithms and Systems.


l To understand necessary Approaches and Techniques to build protection
mechanisms in order to secure computer networks.
l To understand Cryptography Theories, Algorithms and Systems.
UNIT I INTRODUCTION 9
Introduction, The need for security, Security approaches, Principles of security, Types of
Security attacks, Security services, Security Mechanisms, A model for Network Security
(Text 1) Cryptography Concepts and Techniques: Introduction, plain text and cipher text,
substitution techniques, transposition techniques, encryption and decryption, symmetric and
asymmetric key cryptography, steganography, key range and key size, possible types of
attacks.(Text 2)
UNIT II: SYMMETRIC KEY CIPHERS 9
Block Cipher principles, DES, AES, Blowfish, RC5, IDEA, Block cipher operation(Text 1),
Stream ciphers, RC4. Asymmetric key Ciphers: Principles of public key cryptosystems, RSA
algorithm, Elgamal Cryptography, Diffie-Hellman Key Exchange, Knapsack Algorithm.
(Text2)
UNIT III CRYPTOGRAPHIC HASH FUNCTIONS 9 (Text 1)
Message Authentication, Secure Hash Algorithm (SHA-512), Message authentication codes:
Authentication requirements, HMAC, CMAC, Digital signatures, Elgamal Digital Signature
Scheme. Key Management and Distribution: Symmetric Key Distribution Using Symmetric
& Asymmetric Encryption, Distribution of Public Keys, Kerberos, X.509 Authentication
Service, Public – Key Infrastructure.(Text 1)
UNIT IV NETWORK AND INTERNET SECURITY 9
Electronic Mail security – PGP, S/MIME – IP security – Web Security - SYSTEM
SECURITY: Intruders – Malicious software – viruses – Firewalls - Network Access Control
and Cloud Security – Transport Level Security – Wireless Network Security – Email Security
– IP Security.
UNIT V LAB COMPONENT – LIST OF EXPERIMENTS 24
1. Write a C program that contains a string (char pointer) with a value \Hello World’. The
program should XOR each character in this string with 0 and displays the result.
2. Write a C program that contains a string (char pointer) with a value \Hello World’. The
program should AND or and XOR each character in this string with 127 and display the
result.
3. Write a Java program to perform encryption and decryption using the following
algorithms:
a)Ceaser Cipher b) Substitution Cipher c) Hill Cipher
4. Write a Java program to implement the DES algorithm logic
5. Write a Java program to implement RSA Algoithm
6. Implement the Diffie-Hellman Key Exchange mechanism using HTML and JavaScript.
Consider the end user as one of the parties (Alice) and the JavaScript application as other
party (bob).

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy