7th Sem, IT

IT5703: Cryptography and Security Syllabus for IT 7th Sem 2019 Regulation Anna University

Cryptography and Security detailed syllabus for Information Technology (IT) for 2019 regulation curriculum has been taken from the Anna Universities official website and presented for the IT students. For course code, course name, number of credits for a course and other scheme related information, do visit full semester subjects post given below.

For Information Technology 7th Sem scheme and its subjects, do visit IT 7th Sem 2019 regulation scheme. The detailed syllabus of cryptography and security is as follows.

Cryptography and Security

Course Objective:

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Unit I

Introduction To Security and Number Theory
Basics of Security – CIA Triad – Threats, Attacks and Services – Classical Cryptography -Substitution – Transposition – One-time Pad – Cryptanalysis – Number Theory – Modular Arithmetic – Euclidean Theorem – Extended Euclidean Theorem – Algebraic Structures -Galois Field – Prime Numbers – Fermat”s Theorem – Euler”s Phi function – Eulers Theorem – Chinese Remainder theorem – Modular Exponentiation -Logarithms – Elliptic Curve Arithmetic.

Suggested Activities:

  • In-class activity – Practice cryptanalysis of classical cryptography and break the classical algorithms using cryptographic attack.
  • In-class activity – Solve modular exponentiation and multiplicative inverse using Fermat and Euler theorem.
  • Practical – Classical cryptography algorithms using Cryptool.

Suggested Evaluation Methods:

  • Assignments on cryptanalysis of classical cryptography, additive Inverse, Multiplicative Inverse and modular exponentiation using the theorem.
  • Quiz on classical cryptography and number theory.
  • Demonstration of the classical cryptography algorithms using Cryptool.

Unit II

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Unit III

Asymmetric Key Cryptography
Public Key Cryptosystems – RSA Algorithm – ElGamal Cryptosystems – Diffie-Hellman key exchange – Elliptic curve cryptography – Hash functions – Hash algorithms – Secure Hash Algorithm SHA – MD5 – Message Authentication Codes – Quantum Cryptography -Quantum Key Distribution – Threshold Cryptography.

Suggested Activities:

  • Highlight the mathematics behind RSA, Diffie-Hellman Key exchange and Elliptic Curve Cryptography.
  • Demonstrate the Hash code generation using MD5 and SHA 256 algorithm.
  • Practical – Verify the Message Integrity using Hashing Techniques such as MD5 and SHA256.
  • Case studies on Quantum and Threshold Cryptography.

Suggested Evaluation Methods:

  • Assignments on RSA and ECC generation for encryption and decryption process.
  • Quiz on mathematics behind the public key algorithms, Quantum and Threshold Cryptography.

Unit IV

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Unit V

Firewall and Wireless Security
Buffer Overflow and Malicious Software – Password Management – Introduction to Firewall – Firewall Generations – Intrusion Detection System – Types of IDS – Intrusion Prevention System – Wireless LAN – Wireless LAN Security – Network Access Control and Cloud Security.

Suggested Activities:

  • Teaching with case studies: access control and cloud security.
  • Configure the Access Control List and using firewall, mitigate DoS attack.
  • Understand the safety measures during the implementation of security in WLAN.
  • Simulate the importance of various security standards in WLAN.

Suggested Evaluation Methods:

  • Assignments on buffer overflow, malicious software and types of IDS.
  • Quizzes on firewall generation, WLAN security and cloud security.

Course Outcome:

For the complete syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdfs platform to make students’s lives easier.
Get it on Google Play.

Text Books:

  1. William Stallings, “Cryptography and Network security Principles and Practices”, Pearson/PHI, Seventh Edition, 2017.

References:

  1. Wenbo Mao, “Modern Cryptography Theory and Practice”, Pearson Education, 2004.
  2. Pfleeger and Pfleeger, “Security in computing”, Third Edition , PHI/Pearson, 2003.
  3. Behourz Forouzan, Debdeep Mukhopadyay, “Cryptography and Network Security”, Tata McGraw Hill Education Pvt. Ltd, New Delhi, 2010.
  4. Gilles van Assche, “Quantum Cryptography and Secret-Key Distillation”, Cambridge University Press, 2010.

For detailed syllabus of all other subjects of Information Technology, 2019 regulation curriculum do visit IT 7th Sem subject syllabuses for 2019 regulation.

For all Information Technology results, visit Anna University IT all semester results direct link.

Leave a Reply

Your email address will not be published. Required fields are marked *

*