You are on page 1of 4

Course Details

L T P C Issue Date:
3 0 2 4 Jan 2018
Revision
Medium of
Date: Dec
Instruction :
Department: CSE & IT 2017
English Only
Subject : Information Security & Cryptography
Code: CSL 306
Course Designation : Core

Course Outcomes : After the completion of the course the students will be able

CO1 - Discover all the Information Security Goals, Services & Mechanism for Network Security &
necessity of Mathematics in designing crypto algorithms.
CO2 - Develop and design various kinds of Symmetric Key crypto algorithms and to cryptanalyze them.
CO3 - Construct and design various kinds of Asymmetric key crypto algorithms and Mathematics required
for designing.
CO4 - Analyze the integrity of information transmitted & to generate digital signatures.
CO5 - Predict and apply the knowledge and skills obtained to design & understand latest cryptographic
protocols used for securing information in networks or in storage.

Prerequisite: None
Unit Content Lectures
Planned
1.Introduction to What is Information Security, Need for security, Principles of 5
Information Security Security, Threats, Types of Attacks, Services & Mechanisms
& Cryptography Mathematics of Cryptography: Integer Arithmetic, Modular
Arithmetic, Matrices, Linear Congruence
Discover all the Information Security Goals, Services &
CO1 Mechanism for Network Security & necessity of Mathematics in
designing crypto algorithms.
II. Symmetric Key Traditional Symmetric –Key Cipher design and analysis- 18
Ciphers Different Substitution ciphers & Transposition ciphers, Basic
Principles of designing Stream cipher & Block cipher
Mathematics of Symmetric-Key Cryptography-Algebraic
Structures, GF (2n) Fields.
Modern Symmetric key Ciphers- Block Ciphers Design &
Analysis - Data encryption Standard(DES),

Develop and design various kinds of Symmetric Key crypto


CO2 algorithms and to cryptanalyze them.

III. Symmetric Key & Advanced Encryption Standard (AES) 10


Asymmetric Key Stream Ciphers Design & Analysis-LFSR based, RC4, A5/1,
Ciphers Mathematics of Asymmetric-Key Cryptography, Asymmetric
key Ciphers
Construct and designing of various kinds of Asymmetric key
CO3 crypto algorithms and Mathematics required for designing.

IV. Hash Functions & Hash Functions and MAC, Introduction to Digital Signatures. 6
Digital Signatures

Analyze the integrity of information transmitted & to generate


CO4 digital signatures.

V. Network Security Network Security: Security at application layer – PGP & 5


S/MIME, Key distribution Centre, Diffie-Hellman Key
Exchange. Context teaching-Online course
Predict and apply the knowledge and skills obtained to design &
CO5 understand latest cryptographic protocols used for securing
information in networks or in storage.

Total Lectures
45
th
Text Books 1. Cryptography and Network Security 7 Edition, William Stallings
2. Cryptography and Network Security, 4rd edition, Forouzan &
Mukopadhyay, TMH.

Reference Books 1. Information Security & Cryptography-Cryptography Made Simple,


Nigel P Smart, Springer Verlag , 2016
2. Cryptography & Network Security, 2nd Edition, Atul Kahate.
McGrawHill

Reference Web Sites www.lms.ncuindia.edu/lms

Evaluation Scheme Theory-130


Internal-20 (online Course) –context teaching
https://onlinecourses.nptel.ac.in/noc18_cs07/preview
Online Test 10
Minor 30
End term-70

Practical-70
Midterm-20
File-10
Project evaluation-30
End Term Viva-10

Analysis of outcomes
Course Description:
This course is an introductory course to modern cryptography and information
security. It focuses on how cryptographic algorithms and protocols work and how to
use them. The course covers the principles of cryptography, classical ciphers and
general cryptanalysis with Symmetric primitives: Modern encryption methods and
secure hashing. It also speaks about public key cryptography: Key exchange,
asymmetric encryption and digital signatures. Security at Application Layer of
Network
Scope:
This course serves as the introduction to the working primitives, development and
various techniques in the field of information security & cryptography. It emphasizes
reasoning about the constraint and construction of cryptographic protocols that use
shared secret key or public key.

You might also like