M.Tech, Syllabus

JNTUH M.Tech 2017-2018 (R17) Detailed Syllabus Network Security and Cryptography

Network Security and Cryptography Detailed Syllabus for Computer Science and Engineering M.Tech first year first sem is covered here. This gives the details about credits, number of hours and other details along with reference books for the course.

The detailed syllabus for Network Security and Cryptography M.Tech 2017-2018 (R17) first year first sem is as follows.

M.Tech. I Year I Sem.

Course Objectives:

  • Understand the basic categories of threats to computers and networks
  • Understand various cryptographic algorithms.
  • Describe public-key cryptosystem.
  • Describe the enhancements made to IPv4 by IPSec
  • Understand Intrusions and intrusion detection
  • Discuss the fundamental ideas of public-key cryptography.
  • Generate and distribute a PGP key pair and use the PGP package to send an encrypted email message.
  • Discuss Web security and Firewalls

Course Outcomes:

  • Student will be able to understand basic cryptographic algorithms, message and web authentication and security issues.
  • Ability to identify information system requirements for both of them such as client and server.
  • Ability to understand the current legal issues towards information security

UNIT – I : Security Concepts: Introduction, The need for security, Security approaches, Principles of security, Types of Security attacks, Security services, Security Mechanisms, A model for Network Security Cryptography Concepts and Techniques: Introduction, plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography, steganography, key range and key size, possible types of attacks.

UNIT – II : Symmetric key Ciphers: Block Cipher principles, DES, AES, Blowfish, RC5, IDEA, Block cipher operation, Stream ciphers, RC4. Asymmetric key Ciphers: Principles of public key cryptosystems, RSA algorithm, Elgamal Cryptography, Diffie-Hellman Key Exchange, Knapsack Algorithm.

UNIT – III : Cryptographic Hash Functions: Message Authentication, Secure Hash Algorithm (SHA-512), Message authentication codes: Authentication requirements, HMAC, CMAC, Digital signatures, Elgamal Digital Signature Scheme. Key Management and Distribution: Symmetric Key Distribution Using Symmetric & Asymmetric Encryption, Distribution of Public Keys, Kerberos, X.509 Authentication Service, Public – Key Infrastructure

UNIT – IV : Transport-level Security: Web security considerations, Secure Socket Layer and Transport Layer Security, HTTPS, Secure Shell (SSH) Wireless Network Security: Wireless Security, Mobile Device Security, IEEE 802.11 Wireless LAN, IEEE 802.11i Wireless LAN Security

UNIT – V : E-Mail Security: Pretty Good Privacy, S/MIME IP Security: IP Security overview, IP Security architecture, Authentication Header, Encapsulating security payload, combining security associations, Internet Key Exchange Case Studies on Cryptography and security: Secure Multiparty Calculation, Virtual Elections, Single sign On, Secure Inter-branch Payment Transactions, Cross site Scripting Vulnerability.

TEXT BOOKS:

  • Cryptography and Network Security – Principles and Practice: William Stallings, Pearson Education, 6th Edition
  • Cryptography and Network Security : Atul Kahate, Mc Graw Hill, 3rd Edition

REFERENCE BOOKS:

  • Cryptography and Network Security: C K Shyamala, N Harini, Dr T R Padmanabhan, Wiley India, 1st Edition.
  • Cryptography and Network Security : Forouzan Mukhopadhyay, Mc Graw Hill, 3rd Edition
  • Information Security, Principles, and Practice: Mark Stamp, Wiley India.
  • Principles of Computer Security: WM. Arthur Conklin, Greg White, TMH
  • Introduction to Network Security: Neal Krawetz, Cengage Learning
  • Network Security and Cryptography: Bernard Menezes, Cengage Learning

For all other M.Tech 1st Year 1st Sem syllabus go to JNTUH M.Tech Computer Science and Engineering 1st Year 1st Sem Course Structure for (R17) Batch.

All details and yearly new syllabus will be updated here time to time. Subscribe, like us on facebook and follow us on google plus for all updates.

Do share with friends and in case of questions please feel free drop a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.