5th Sem, IT

ITC504: Cryptography & Network Security Syllabus for IT 5th Sem 2018 Pattern Mumbai University

Cryptography & Network Security detailed syllabus scheme for Information Technology (IT), 2018 regulation has been taken from the University of Mumbai official website and presented for the Bachelor of Engineering students. For Course Code, Course Title, Test 1, Test 2, Avg, End Sem Exam, Team Work, Practical, Oral, Total, and other information, do visit full semester subjects post given below.

For all other Mumbai University Information Technology 5th Sem Syllabus 2018 Pattern, do visit IT 5th Sem 2018 Pattern Scheme. The detailed syllabus scheme for cryptography & network security is as follows.

Cryptography & Network Security Syllabus for Information Technology TE 5th Sem 2018 Pattern Mumbai University

Cryptography & Network Security

Course Objectives:

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdf platform to make students’s lives easier.
Get it on Google Play.

Course Outcomes:

Students will be able to:

  1. Identify information security goals, classical encryption techniques and acquire fundamental knowledge on the concepts of finite fields and number theory.
  2. Understand, compare and apply different encryption and decryption techniques to solve problems related to confidentiality and authentication
  3. Apply the knowledge of cryptographic checksums and evaluate the performance of different message digest algorithms for verifying the integrity of varying message sizes
  4. Apply different digital signature algorithms to achieve authentication and create secure applications
  5. Apply network security basics, analyze different attacks on networks and evaluate the performance of firewalls and security protocols like SSL, IPSec, and PGP.
  6. Apply the knowledge of cryptographic utilities and authentication mechanisms to design secure applications

Prerequisites:

Computer Networks

Module I

Introduction & Number Theory Services, Mechanisms and attacks-the OSI security architecture-Network security model-Classical Encryption techniques (Symmetric cipher model, mono-alphabetic and poly-alphabetic substitution techniques: Vignere cipher, playfair cipher, Hill cipher, transposition techniques: keyed and keyless transposition ciphers, steganography). 09 CO1

Module II

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdf platform to make students’s lives easier.
Get it on Google Play.

Module III

Cryptographi c Hashes, Message Digests and Digital Certificates Authentication requirement – Authentication function , Types of Authentication, MAC -Hash function – Security of hash function and MAC -MD5 – SHA – HMAC – CMAC, Digital Certificate: X.509, PKI 09 CO3

Module IV

Digital signature schemes and authenticatio n Protocols Digital signature and authentication protocols : Needham Schroeder Authentication protocol, Digital Signature Schemes – RSA, EI Gamal and Schnorr, DSS. 07 CO4

Module V

Network Security Network security basics: TCP/IP vulnerabilities (Layer wise), Packet Sniffing, ARP spoofing, port scanning, IP spoofing, TCP syn flood, DNS Spoofing. Denial of Service: Classic DOS attacks, Source Address spoofing, ICMP flood, SYN flood, UDP flood, Distributed Denial of Service, Defenses against Denial of Service Attacks. 10 CO5 Firewalls, Intrusion Detection Systems: Host Based and Network Based IDS, Honey pots.

Module VI

For the complete Syllabus, results, class timetable, and many other features kindly download the iStudy App
It is a lightweight, easy to use, no images, and no pdf platform to make students’s lives easier.
Get it on Google Play.

Text Books:

  1. Mark Stamps Information Security Principles and Practice, Wiley
  2. William Stallings, Cryptography and Network Security, Principles and Practice, 6th Edition, Pearson Education, March 2013
  3. Behrouz A. Ferouzan, Cryptography & Network Security, Tata Mc Graw Hill
  4. Bernard Menezes, Cryptography & Network Security, Cengage Learning

Reference Books:

  1. Applied Cryptography, Protocols Algorithms and Source Code in C, Bruce Schneier, Wiley.
  2. Cryptography and Network Security, Atul Kahate, Tata Mc Graw Hill.

Assessment:

Internal Assessment for 20 marks: Consisting of Two Compulsory Class Tests Approximately 40% to 50% of syllabus content must be covered in First test and remaining 40% to 50% of syllabus contents must be covered in second test. End Semester Theory Examination: Some guidelines for setting the question papers are as:

  • Weightage of each module in end semester examination is expected to be/will be proportional to number of respective lecture hours mentioned in the syllabus.
  • Question paper will comprise of total six questions, each carrying 20 marks.
  • Q.1 will be compulsory and should cover maximum contents of the syllabus.
  • Remaining question will be mixed in nature (for example if Q.2 has part
    1. from module 3 then part
    2. will be from any other module. (Randomly selected from all the modules)
  • Total four questions need to be solved.

For detail syllabus of all other subjects of Information Technology (IT) 5th Sem 2018 regulation, visit IT 5th Sem Subjects syllabus for 2018 regulation.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.