Cryptography And Network Security

Course Code: MCA314

Course Title: Cryptography and Network Security (4 Credits)

 

Back

 

Course Contents

 

Unit 1: Security in Computing Environment: Need for Security; Security Attack – Threats, Vulnerabilities, and Controls, Types of Threats (Attacks); Security Services – Confidentiality, Integrity, Availability; Information Security; Methods of Protection.

 

Unit 2: Basics of Cryptography: Terminologies used in Cryptography; Substitution Techniques – The Caesar Cipher, One-Time Pads, The Vernam Cipher, Book Cipher; Transposition Techniques – Encipherment/Decipherment Complexity, Digrams, Trigrams, and Other Patterns.

 

Unit 3: Encryption and Decryption: Characteristics of Good Encryption Technique; Properties of Trustworthy Encryption Systems; Types of Encryption Systems – Based on Key, Based on Block; Confusion and Diffusion; Cryptanalysis.

 

Unit 4: Symmetric Key Encryption: Data Encryption Standard (DES) Algorithm – Overview of the DES Algorithm; Double and Triple DES – Double DES, Triple DES; Security of the DES; Advanced Encryption Standard (AES) Algorithm – Overview of Rijndael, Strength of the Algorithm; DES and AES Comparison.

 

Unit 5: Public Key Encryption: Characteristics of Public Key System; RSA Technique – Encryption-Method; Key Exchange; Diffie-Hellman Scheme; Cryptographic Hash Functions; Digital Signature – Properties of Digital Signature, Public Key Protocol; Certificates; Certificate Authorities.

 

Unit 6: Protection of Computing Resources: Secure Programs – Fixing Faults, Unexpected Behaviour, Types of Flaws; Non-malicious Program Errors – Buffer Overflows, Incomplete Mediation; Viruses and Other Malicious Code – Kinds of Malicious Code, Virus Attack, Appended Virus; Targeted Malicious Code – Trapdoors, Causes of Trapdoors; Methods of Control – Developmental Controls, Operating System Controls on use of Programs, Administrative Controls.

 

Unit 7: Security Features in Operating System: Objects to be Protected; Protection Methods of Operating Systems; Memory Protection; File Protection – All-None Protection, Group Protection, Single Permissions; User Authentication – Use of Passwords, Additional Authentication Information, Attacks on Passwords, Exhaustive Attack, Password Selection Criteria.

 

Unit 8: Designing Trusted Operating Systems: Types of Security Policies – Military Security Policy, Commercial Security Policy, Chinese Wall Security Policy; Models of Security; Design of OS – Design Elements, Security Features of Ordinary Operating Systems, Security Features of Trusted Operating Systems.

 

Unit 9: Network Security: Network Concepts; Threats in Networks – Who Attacks Networks? Threats in Transit: Eavesdropping and Wiretapping, Protocol Flaws, Impersonation; Network Security Controls – Architecture, Encryption, Virtual Private Networks, Public Key Infrastructure (PKI) and Certificates.

 

Unit 10: IP Security: Overview of IP Security (IPSec); IP Security Architecture; Modes of Operation; Security Associations (SA) – Security Parameter Index (SPI), SA Management, Security Policy; Authentication Header (AH); Encapsulating Security Payload (ESP); Internet Key Exchange.

 

Unit 11: Web Security: Web Security Requirements; Secure Socket Layer (SSL) – SSL Architecture, SSL Protocol; Transport Layer Security (TLS); Secure Electronic Transaction (SET) – Features, Components, Dual Signature, Purchase Request.

 

Unit 12: Electronic Mail Security: Threats to E-Mail; Requirements and Solutions – Confidentiality, Integrity; Encryption for Secure E-Mail; Secure E-Mail System – PGP (Pretty Good Privacy), S/MIME (Secure Multipurpose Internet Mail Extensions).

 

Unit 13: Firewalls: Firewalls – Types – Packet Filtering Gateway, Stateful Inspection Firewall, Application Proxy, Guard, Personal Firewalls; Comparison of Firewall Types; Firewall Configurations.

 

Unit 14: Planning and Enforcing Security Policies: Planning Security Policies; Risk Analysis; Security Policies for an Organization; External Security.

 

Back