Syllabus

CNS Syllabus (Cryptography and Network Security) JNTUH B.Tech 2016-17 (R16)

CNS Syllabus (Cryptography and Network Security) for JNTUH B.Tech III year II sem is covered here. This gives the details about credits, number of hours, and other details along with reference books for the course.

CNS Syllabus JNTUH 2016-17 (R16)

B.Tech. III Year II Sem.   L/T/P/C
Course Code:CS603PC        4/0/0/4

Course Objectives:

  • Explain the objectives of information security
  • Explain the importance and application of each of confidentiality, integrity, authentication and availability
  • Understand various cryptographic algorithms.
  • Understand the basic categories of threats to computers and networks
  • Describe public-key cryptosystem.
  • Describe the enhancements made to IPv4 by IPSec
  • Understand Intrusions and intrusion detection
  • Discuss the fundamental ideas of public-key cryptography.
  • Generate and distribute a PGP key pair and use the PGP package to send an encrypted e-mail message.
  • Discuss Web security and Firewalls

Course Outcomes:

  • Student will be able to understand basic cryptographic algorithms, message and web authentication and security issues.
  • Ability to identify information system requirements for both of them such as client and server.
  • Ability to understand the current legal issues towards information security.

UNIT – I:  Security Concepts: Introduction, The need for security, Security approaches, Principles of security, Types of Security attacks, Security services, Security Mechanisms, A model for Network Security Cryptography Concepts and Techniques: Introduction, plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography, steganography, key range and key size, possible types of attacks.

UNIT – II: Symmetric key Ciphers: Block Cipher principles, DES, AES, Blowfish, RC5, IDEA, Block cipher operation, Stream ciphers, RC4. Asymmetric key Ciphers: Principles of public key cryptosystems, RSA algorithm, Elgamal Cryptography, Diffie-Hellman Key Exchange, Knapsack Algorithm.

UNIT – III:  Cryptographic Hash Functions: Message Authentication, Secure Hash Algorithm (SHA-512), Message authentication codes: Authentication requirements, HMAC, CMAC, Digital signatures, Elgamal Digital Signature Scheme. Key Management and Distribution: Symmetric Key Distribution Using Symmetric & Asymmetric Encryption, Distribution of Public Keys, Kerberos, X.509 Authentication Service, Public – Key Infrastructure

Download iStudy Android App for complete JNTUH syllabus, results, timetables and all other updates. There are no ads and no pdfs and will make your life way easier.

TEXT BOOKS:

  • Cryptography and Network Security – Principles and Practice: William Stallings, Pearson Education, 6th Edition
  • Cryptography and Network Security: Atul Kahate, Mc Graw Hill, 3rd Edition

REFERENCE BOOKS:

  • Cryptography and Network Security: C K Shyamala, N Harini, Dr T R Padmanabhan, Wiley India, 1st Edition.
  • Cryptography and Network Security : Forouzan Mukhopadhyay, Mc Graw Hill, 3rd Edition
  • Information Security, Principles, and Practice: Mark Stamp, Wiley India.
  • Principles of Computer Security: WM. Arthur Conklin, Greg White, TMH
  • Introduction to Network Security: Neal Krawetz, CENGAGE Learning
  • Network Security and Cryptography: Bernard Menezes, CENGAGE Learning

For all other B.Tech 3rd Year 2nd Sem syllabus go to JNTUH B.Tech Computer Science and Engineering 3rd Year 2nd Sem Course Structure for (R16) Batch.

All details and yearly new syllabus will be updated here time to time. Subscribe, like us on Facebook and follow us on google plus for all updates.

Do share with friends and in case of questions please feel free to drop a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.