Cns Syllabus

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

R-20 Syllabus for CSE, JNTUK w. e. f.

2020 – 21

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY KAKINADA


KAKINADA – 533 003, Andhra Pradesh, India

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


L T P C
III Year – II Semester
3 0 0 3
CRYPTOGRAPHY AND NETWORK SECURITY

Course Objectives:
The main objectives of this course are to explore the working principles and utilities of various
cryptographic algorithms including secret key cryptography, hashes and message digests, public key
algorithms, design issues and working principles of various authentication protocols and various secure
communication standards including Kerberos, IPsec, and SSL/TLS.

Course Outcomes : At the end of the course, student will be able to


x Explain different security threats and countermeasures and foundation course of cryptography
mathematics.
x Classify the basic principles of symmetric key algorithms and operations of some symmetric key
algorithms and asymmetric key cryptography
x Revise the basic principles of Public key algorithms and Working operations of some Asymmetric key
algorithms such as RSA, ECC and some more
x Design applications of hash algorithms, digital signatures and key management techniques
x Determine the knowledge of Application layer, Transport layer and Network layer security Protocols
such as PGP, S/MIME, SSL,TSL, and IPsec .

UNIT I:
Basic Principles : Security Goals, Cryptographic Attacks, Services and Mechanisms, Mathematics of
Cryptography.

UNIT II:
Symmetric Encryption: Mathematics of Symmetric Key Cryptography, Introduction to Modern
Symmetric Key Ciphers, Data Encryption Standard, Advanced Encryption Standard.

UNIT III:
Asymmetric Encryption: Mathematics of Asymmetric Key Cryptography, Asymmetric Key
Cryptography

UNIT IV:
Data Integrity, Digital Signature Schemes & Key Management : Message Integrity and Message
Authentication, Cryptographic Hash Functions, Digital Signature, Key Management.

UNIT V:
Network Security-I: Security at application layer: PGP and S/MIME, Security at the Transport Layer:
SSL and TLS, Network Security-II : Security at the Network Layer: IPSec, System Security

Text Books:
1. Cryptography and Network Security, 3rd Edition Behrouz A Forouzan, Deb deep Mukhopadhyay,
McGraw Hill,2015
2. Cryptography and Network Security,4th Edition, William Stallings, (6e) Pearson,2006
3. Everyday Cryptography, 1st Edition, Keith M.Martin, Oxford,2016

Reference Books:
1. Network Security and Cryptography, 1st Edition, Bernard Meneges, Cengage Learning,2018

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy