{"id":33071,"date":"2021-05-21T08:09:15","date_gmt":"2021-05-21T08:09:15","guid":{"rendered":"https:\/\/www.inspirenignite.com\/anna-university\/it5703-cryptography-and-security-syllabus-for-it-7th-sem-2019-regulation-anna-university\/"},"modified":"2021-05-21T08:09:15","modified_gmt":"2021-05-21T08:09:15","slug":"it5703-cryptography-and-security-syllabus-for-it-7th-sem-2019-regulation-anna-university","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/anna-university\/it5703-cryptography-and-security-syllabus-for-it-7th-sem-2019-regulation-anna-university\/","title":{"rendered":"IT5703: Cryptography and Security Syllabus for IT 7th Sem 2019 Regulation Anna University"},"content":{"rendered":"<p align=\"justify\">Cryptography and Security detailed syllabus for Information Technology (IT) for 2019 regulation curriculum has been taken from the <a class=\"rank-math-link\" href=\"https:\/\/cac.annauniv.edu\/\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">Anna Universities<\/a> official website and presented for the IT students. For course code, course name, number of credits for a course and other scheme related information,  do visit full semester subjects post given below. <\/p>\n<p align=\"justify\">For Information Technology 7th Sem scheme and its subjects, do visit <a class=\"rank-math-link\" href=\"..\/information-technology-it-syllabus-for-7th-sem-2019-regulation-anna-university\">IT 7th Sem 2019 regulation scheme<\/a>. The detailed syllabus of cryptography and security is as follows. <\/p>\n<p>  <title>Cryptography and Security<\/title><\/p>\n<h4>Course Objective:<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.   <\/p>\n<h4>Unit I<\/h4>\n<p align=\"justify\">\n  <strong>Introduction To Security and Number Theory<\/strong><br \/>\n  Basics of Security &#8211; CIA Triad &#8211; Threats, Attacks and Services &#8211; Classical Cryptography -Substitution &#8211; Transposition &#8211; One-time Pad &#8211; Cryptanalysis &#8211; Number Theory &#8211; Modular Arithmetic &#8211; Euclidean Theorem &#8211; Extended Euclidean Theorem &#8211; Algebraic Structures -Galois Field &#8211; Prime Numbers &#8211; Fermat&#8221;s Theorem &#8211; Euler&#8221;s Phi function &#8211; Eulers Theorem &#8211; Chinese Remainder theorem &#8211; Modular Exponentiation -Logarithms &#8211; Elliptic Curve Arithmetic.<\/p>\n<p><i>Suggested Activities:<\/i>\n  <\/p>\n<ul>\n<li>In-class activity &#8211; Practice cryptanalysis of classical cryptography and break the classical algorithms using cryptographic attack.<\/li>\n<li>In-class activity &#8211; Solve modular exponentiation and multiplicative inverse using Fermat and Euler theorem.<\/li>\n<li>Practical &#8211; Classical cryptography algorithms using Cryptool.<\/li>\n<\/ul>\n<p><i>Suggested Evaluation Methods:<\/i>\n  <\/p>\n<ul>\n<li>Assignments on cryptanalysis of classical cryptography, additive Inverse, Multiplicative Inverse and modular exponentiation using the theorem.<\/li>\n<li>Quiz on classical cryptography and number theory.<\/li>\n<li>Demonstration of the classical cryptography algorithms using Cryptool.<\/li>\n<\/ul>\n<h4>Unit II<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.   <\/p>\n<h4>Unit III<\/h4>\n<p align=\"justify\">\n  <strong>Asymmetric Key Cryptography<\/strong><br \/>\n  Public Key Cryptosystems &#8211; RSA Algorithm &#8211; ElGamal Cryptosystems &#8211; Diffie-Hellman key exchange &#8211; Elliptic curve cryptography &#8211; Hash functions &#8211; Hash algorithms &#8211; Secure Hash Algorithm SHA &#8211; MD5 &#8211; Message Authentication Codes &#8211; Quantum Cryptography -Quantum Key Distribution &#8211; Threshold Cryptography.<\/p>\n<p><i>Suggested Activities:<\/i>\n  <\/p>\n<ul>\n<li>Highlight the mathematics behind RSA, Diffie-Hellman Key exchange and Elliptic Curve Cryptography.<\/li>\n<li>Demonstrate the Hash code generation using MD5 and SHA 256 algorithm.<\/li>\n<li>Practical &#8211; Verify the Message Integrity using Hashing Techniques such as MD5 and SHA256.<\/li>\n<li>Case studies on Quantum and Threshold Cryptography.<\/li>\n<\/ul>\n<p><i>Suggested Evaluation Methods:<\/i>\n  <\/p>\n<ul>\n<li>Assignments on RSA and ECC generation for encryption and decryption process.<\/li>\n<li>Quiz on mathematics behind the public key algorithms, Quantum and Threshold Cryptography.<\/li>\n<\/ul>\n<h4>Unit IV<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.   <\/p>\n<h4>Unit V<\/h4>\n<p align=\"justify\">\n  <strong>Firewall and Wireless Security<\/strong><br \/>\n  Buffer Overflow and Malicious Software &#8211; Password Management &#8211; Introduction to Firewall &#8211; Firewall Generations &#8211; Intrusion Detection System &#8211; Types of IDS &#8211; Intrusion Prevention System &#8211; Wireless LAN &#8211; Wireless LAN Security &#8211; Network Access Control and Cloud Security.<\/p>\n<p><i>Suggested Activities:<\/i>\n  <\/p>\n<ul>\n<li>Teaching with case studies: access control and cloud security.<\/li>\n<li>Configure the Access Control List and using firewall, mitigate DoS attack.<\/li>\n<li>Understand the safety measures during the implementation of security in WLAN.<\/li>\n<li>Simulate the importance of various security standards in WLAN.<\/li>\n<\/ul>\n<p><i>Suggested Evaluation Methods:<\/i>\n  <\/p>\n<ul>\n<li>Assignments on buffer overflow, malicious software and types of IDS.<\/li>\n<li>Quizzes on firewall generation, WLAN security and cloud security.<\/li>\n<\/ul>\n<h4>Course Outcome:<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete syllabus, results, class timetable, and many other features kindly download the <a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdfs platform to make students&#8217;s lives easier.<\/b><br \/><a class=\"rank-math-link\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.   <\/p>\n<h4>Text Books:<\/h4>\n<p align=\"justify\">\n<ol>\n<li>William Stallings, &#8220;Cryptography and Network security Principles and Practices&#8221;, Pearson\/PHI, Seventh Edition, 2017.<\/li>\n<\/ol>\n<h4>References:<\/h4>\n<p align=\"justify\">\n<ol>\n<li>Wenbo Mao, &#8220;Modern Cryptography Theory and Practice&#8221;, Pearson Education, 2004.<\/li>\n<li>Pfleeger and Pfleeger, &#8220;Security in computing&#8221;, Third Edition , PHI\/Pearson, 2003.<\/li>\n<li>Behourz Forouzan, Debdeep Mukhopadyay, &#8220;Cryptography and Network Security&#8221;, Tata McGraw Hill Education Pvt. Ltd, New Delhi, 2010.<\/li>\n<li>Gilles van Assche, &#8220;Quantum Cryptography and Secret-Key Distillation&#8221;, Cambridge University Press, 2010.<\/li>\n<\/ol>\n<p align=\"justify\">For detailed syllabus of all other subjects of Information Technology, 2019 regulation curriculum do visit <a class=\"rank-math-link\" href=\"..\/category\/it+7th-sem\">IT 7th Sem subject syllabuses for 2019 regulation<\/a>. <\/p>\n<p align=\"justify\">For all Information Technology results, visit <a class=\"rank-math-link\" href=\"https:\/\/www.inspirenignite.com\/anna-university\/anna-university-results\/\">Anna University IT all semester results<\/a> direct link. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptography and Security detailed syllabus for Information Technology (IT) for 2019 regulation curriculum has been taken from the Anna Universities official website and presented for the IT students. For course [&hellip;]<\/p>\n","protected":false},"author":2297,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[50,72],"tags":[],"class_list":["post-33071","post","type-post","status-publish","format-standard","hentry","category-7th-sem","category-it"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/33071","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/users\/2297"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/comments?post=33071"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/posts\/33071\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/media?parent=33071"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/categories?post=33071"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/anna-university\/wp-json\/wp\/v2\/tags?post=33071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}