6th Sem, Computer Engg

CSC604: Cryptography & System Security Syllabus for CS 6th Sem 2018 Pattern Mumbai University

Cryptography & System Security detailed syllabus scheme for Computer Engineering (CS), 2018 regulation has been taken from the University of Mumbai official website and presented for the Bachelor of Engineering students. For Course Code, Course Title, Test 1, Test 2, Avg, End Sem Exam, Team Work, Practical, Oral, Total, and other information, do visit full semester subjects post given below.

For all other Mumbai University Computer Engineering 6th Sem Syllabus 2018 Pattern, do visit CS 6th Sem 2018 Pattern Scheme. The detailed syllabus scheme for cryptography & system security is as follows.

Cryptography & System Security Syllabus for Computer Engineering TE 6th Sem 2018 Pattern Mumbai University

Cryptography & System Security

Course Objectives:

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdf platform to make students’s lives easier.
Get it on Google Play.

Course Outcomes:

At the end of the course learner will able to

  1. Understand system security goals and concepts, classical encryption techniques and acquire fundamental knowledge on the concepts of modular arithmetic and number theory.
  2. Understand, compare and apply different encryption and decryption techniques to solve problems related to confidentiality and authentication
  3. Apply the knowledge of cryptographic checksums and evaluate the performance of different message digest algorithms for verifying the integrity of varying message sizes.
  4. Apply different digital signature algorithms to achieve authentication and design secure applications
  5. Understand network security basics, analyze different attacks on networks and evaluate the performance of firewalls and security protocols like SSL, IPSec, and PGP.
  6. Analyze and apply system security concept to recognize malicious code.

Module 1

Introduction & Number Theory 10

  1. Security Goals, Services, Mechanisms and attacks, The OSI security architecture, Network security model, Classical Encryption techniques, Symmetric cipher model, mono-alphabetic and poly-alphabetic substitution techniques: Vigenere cipher, playfair cipher, Hill cipher, transposition techniques: keyed and keyless transposition ciphers, steganography.
  2. Modular Arithmetic and Number Theory:- Euclids algorithmPrime numbers-Fermats and Eulers theorem- Testing for primality -The Chinese remainder theorem, Discrete logarithms.

Module 2

Symmetric and Asymmetric key Cryptography and key Management 12

  1. Block cipher principles, block cipher modes of operation, DES, Double DES, Triple DES, Advanced Encryption Standard (AES), Stream Ciphers: RC5 algorithm.
  2. Public key cryptography: Principles of public key cryptosystems-The RSA algorithm, The knapsack algorithm, ElGamal Algorithm.
  3. Key management techniques: using symmetric and asymmetric algorithms and trusted third party. Diffie Hellman Key exchange algorithm.

Module 3

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdf platform to make students’s lives easier.
Get it on Google Play.

Module 4

Authentication Protocols & Digital signature schemes 08

  1. User Authentication and Entity Authentication, One-way and mutual authentication schemes, Needham Schroeder Authentication protocol, Kerberos Authentication protocol.
  2. Digital Signature Schemes – RSA, EIGamal and Schnorr signature schemes.

Module 5

Network Security and Applications 10

  1. Network security basics: TCP/IP vulnerabilities (Layer wise), Packet Sniffing, ARP spoofing, port scanning, IP spoofing, TCP syn flood, DNS Spoofing.
  2. Denial of Service: Classic DOS attacks, Source Address spoofing, ICMP flood, SYN flood, UDP flood, Distributed Denial of Service, Defenses against Denial of Service Attacks.
  3. Internet Security Protocols: SSL, IPSEC, Secure Email: PGP, Firewalls, IDS and types, Honey pots

Module 6

System Security 06

  1. Software Vulnerabilities: Buffer Overflow, Format string, cross-site scripting, SQL injection, Malware: Viruses, Worms, Trojans, Logic Bomb, Bots, Rootkits.

Text Books:

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdf platform to make students’s lives easier.
Get it on Google Play.

Reference Books:

  1. Applied Cryptography, Protocols Algorithms and Source Code in C, Bruce Schneier, Wiley.
  2. Cryptography and Network Security, Atul Kahate, Tata Mc Graw Hill.

Assessment

Internal Assessment: Assessment consists of two class tests of 20 marks each. The first class test is to be conducted when approx. 40% syllabus is completed and second class test when additional 40% syllabus is completed. Duration of each test shall be one hour.

Theory Examination:

  1. Question paper will comprise of total six questions.
  2. All question carry equal marks
  3. Questions will be mixed in nature (for example supposed Q.2 has part
    1. from module 3 then part
    2. will be from any module other than module 3)
  4. Only Four question need to be solved.

In question paper weightage of each module will be proportional to number of respective lecture hours as mentioned in the syllabus.

For detail syllabus of all other subjects of Computer Engineering (CS) 6th Sem 2018 regulation, visit CS 6th Sem Subjects syllabus for 2018 regulation.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.