{"id":290,"date":"2016-11-03T15:59:55","date_gmt":"2016-11-03T15:59:55","guid":{"rendered":"http:\/\/www.inspirenignite.com\/anna-university\/?p=290"},"modified":"2019-07-17T06:56:56","modified_gmt":"2019-07-17T06:56:56","slug":"anna-university-b-tech-it-r13-7th-cryptography-and-network-security-detailed-syllabus","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/anna-university\/anna-university-b-tech-it-r13-7th-cryptography-and-network-security-detailed-syllabus\/","title":{"rendered":"Anna University B.Tech IT (R13) 7th Cryptography and Network Security Detailed Syllabus"},"content":{"rendered":"<p>Cryptography and Network Security Syllabus for B.Tech 7th sem is covered here. This gives the details about credits, number of hours and other details along with reference books for the course.<\/p>\n<p>The detailed syllabus for Cryptography and Network Security B.Tech (R13) seventhsem is as follows<\/p>\n<p><strong>OBJECTIVES<\/strong>: The student should be made to:<\/p>\n<ul>\n<li>Understand OSI security architecture and classical encryption techniques.<\/li>\n<li>Acquire fundamental knowledge on the concepts of finite fields and number theory.<\/li>\n<li>Understand various block cipher and stream cipher models.<\/li>\n<li>Describe the principles of public key cryptosystems, hash functions and digital signature.<\/li>\n<\/ul>\n<p><strong>UNIT I : INTRODUCTION &amp; NUMBER THEORY<\/strong> \u00a0 \u00a0[10 hours]<br \/>\nServices, Mechanisms and attacks-the OSI security architecture-Network security model-Classical Encryption techniques (Symmetric cipher model, substitution techniques, transposition techniques, steganography).FINITE FIELDS AND NUMBER THEORY: Groups, Rings, Fields-Modular arithmetic-Euclid\u201fs algorithm-Finite fields- Polynomial Arithmetic \u2013Prime numbers-Fermat\u201fs and Euler\u201fs theorem-Testing for primality -The Chinese remainder theorem- Discrete logarithms.<\/p>\n<p><strong>UNIT II : BLOCK CIPHERS &amp; PUBLIC KEY CRYPTOGRAPHY<\/strong>\u00a0 \u00a0 \u00a0 \u00a0 [10 hours]<br \/>\nData Encryption Standard-Block cipher principles-block cipher modes of operation-Advanced Encryption Standard (AES)-Triple DES-Blowfish-RC5 algorithm. Public key cryptography: Principles of public key cryptosystems-The RSA algorithm-Key management &#8211; Diffie Hellman Key exchange-Elliptic curve arithmetic-Elliptic curve cryptography.<\/p>\n<p><strong>UNIT III : HASH FUNCTIONS AND DIGITAL SIGNATURES<\/strong> \u00a0 \u00a0 \u00a0 \u00a0 \u00a0[10 hours]<br \/>\nAuthentication requirement \u2013 Authentication function \u2013 MAC \u2013 Hash function \u2013 Security of hash function and MAC \u2013MD5 &#8211; SHA &#8211; HMAC \u2013 CMAC &#8211; Digital signature and authentication protocols \u2013 DSS \u2013 EI Gamal \u2013 Schnorr.<\/p>\n<p style=\"text-align: center\"><strong><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">Download iStudy<\/a> <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">Android<\/a><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\"> App for complete Anna University syllabus, results, timetables and all other updates. There are no ads and no pdfs and will make your life way easier.<\/a><\/strong><\/p>\n<p><strong>TOTAL: 45 <\/strong><strong>PERIODS <\/strong><\/p>\n<p><strong>OUTCOMES:<\/strong> Upon Completion of the course, the students should be able to:<\/p>\n<ul>\n<li>Compare various Cryptographic Techniques<\/li>\n<li>Design Secure applications<\/li>\n<li>Inject secure coding in the developed applications<\/li>\n<\/ul>\n<p><strong>TEXT BOOKS<\/strong>:<\/p>\n<ul>\n<li>William Stallings, Cryptography and Network Security, 6th Edition, Pearson Education, March 2013. (UNIT I,II,III,IV).<\/li>\n<li>Charlie Kaufman, Radia Perlman and Mike Speciner, \u201cNetwork Security\u201d, Prentice Hall of India, 2002. (UNIT V).<\/li>\n<\/ul>\n<p><strong>REFERENCES:<\/strong><\/p>\n<ul>\n<li>Behrouz A. Ferouzan, \u201cCryptography &amp; Network Security\u201d, Tata Mc Graw Hill, 2007.<\/li>\n<li>Man Young Rhee, \u201cInternet Security: Cryptographic Principles\u201d, \u201cAlgorithms and Protocols\u201d, Wiley Publications, 2003.<\/li>\n<li>Charles Pfleeger, \u201cSecurity in Computing\u201d, 4th Edition, Prentice Hall of India, 2006.<\/li>\n<li>Ulysess Black, \u201cInternet Security Protocols\u201d, Pearson Education Asia, 2000.<\/li>\n<li>Charlie Kaufman and Radia Perlman, Mike Speciner, \u201cNetwork Security, Second Edition, Private Communication in Public World\u201d, PHI 2002.<\/li>\n<li>Bruce Schneier and Neils Ferguson, \u201cPractical Cryptography\u201d, First Edition, Wiley Dreamtech India Pvt Ltd, 2003.<\/li>\n<li>Douglas R Simson \u201cCryptography \u2013 Theory and practice\u201d, First Edition, CRC Press, 1995.<\/li>\n<li>http:\/\/nptel.ac.in\/.<\/li>\n<\/ul>\n<p>For all other B.Tech IT 7th sem syllabus go to <a href=\"http:\/\/www.inspirenignite.com\/anna-university\/anna-university-b-tech-information-technology-7th-sem-course-structure-for-r13-batch\/\">Anna University B.Tech Information Technology (IT) 7th Sem Course Structure for (R13) Batch.<\/a>\u00a0All details and yearly new syllabus will be updated here time to time.<\/p>\n<p>Do share with friends and in case of questions please feel free drop a comment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptography and Network Security Syllabus for B.Tech 7th sem is covered here. This gives the details about credits, number of hours and other details along with reference books for the [&hellip;]<\/p>\n","protected":false},"author":2259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-290","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/290","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/users\/2259"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/comments?post=290"}],"version-history":[{"count":2,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/290\/revisions"}],"predecessor-version":[{"id":10602,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/290\/revisions\/10602"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/media?parent=290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/categories?post=290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/tags?post=290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}