{"id":13811,"date":"2020-08-27T06:40:48","date_gmt":"2020-08-27T06:40:48","guid":{"rendered":"https:\/\/www.inspirenignite.com\/mh\/itc504-cryptography-network-security-syllabus-for-it-5th-sem-2018-pattern-mumbai-university\/"},"modified":"2020-08-27T06:40:48","modified_gmt":"2020-08-27T06:40:48","slug":"itc504-cryptography-network-security-syllabus-for-it-5th-sem-2018-pattern-mumbai-university","status":"publish","type":"post","link":"https:\/\/www.inspirenignite.com\/mh\/itc504-cryptography-network-security-syllabus-for-it-5th-sem-2018-pattern-mumbai-university\/","title":{"rendered":"ITC504: Cryptography &amp; Network Security Syllabus for IT 5th Sem 2018 Pattern Mumbai University"},"content":{"rendered":"<p align=\"justify\">Cryptography &amp; Network Security detailed syllabus scheme for Information Technology (IT), 2018 regulation has been taken from the <a href=\"https:\/\/mu.ac.in\/syllabus\" style=\"color: inherit\" target=\"_blank\" rel=\"noopener\">University of Mumbai<\/a> official website and presented for the Bachelor of Engineering students. For Course Code, Course Title, Test 1, Test 2, Avg, End Sem Exam, Team Work, Practical, Oral, Total, and other information, do visit full semester subjects post given below. <\/p>\n<p align=\"justify\">For all other Mumbai University Information Technology 5th Sem Syllabus 2018 Pattern, do visit <a href=\"..\/mumbai-university-information-technology-5th-sem-syllabus-2018-pattern\">IT 5th Sem 2018 Pattern Scheme<\/a>. The detailed syllabus scheme for cryptography &amp; network security is as follows.<\/p>\n<h2 align=\"center\">Cryptography &amp; Network Security Syllabus for Information Technology TE 5th Sem 2018 Pattern Mumbai University<\/h2>\n<p>  <title>Cryptography &amp; Network Security<\/title><\/p>\n<h4>Course Objectives:<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete Syllabus, results, class timetable, and many other features kindly download the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdf platform to make students&#8217;s lives easier.<\/b><br \/><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.  <\/p>\n<h4>Course Outcomes:<\/h4>\n<p align=\"justify\">\nStudents will be able to:<\/p>\n<ol>\n<li>Identify information security goals, classical encryption techniques and acquire fundamental knowledge on the concepts of finite fields and number theory.<\/li>\n<li>Understand, compare and apply different encryption and decryption techniques to solve problems related to confidentiality and authentication<\/li>\n<li>Apply the knowledge of cryptographic checksums and evaluate the performance of different message digest algorithms for verifying the integrity of varying message sizes<\/li>\n<li>Apply different digital signature algorithms to achieve authentication and create secure applications<\/li>\n<li>Apply network security basics, analyze different attacks on networks and evaluate the performance of firewalls and security protocols like SSL, IPSec, and PGP.<\/li>\n<li>Apply the knowledge of cryptographic utilities and authentication mechanisms to design secure applications<\/li>\n<\/ol>\n<h4>Prerequisites:<\/h4>\n<p align=\"justify\">\nComputer Networks<\/p>\n<h4>Module I<\/h4>\n<p align=\"justify\">\nIntroduction &amp; Number Theory Services, Mechanisms and attacks-the OSI security architecture-Network security model-Classical Encryption techniques (Symmetric cipher model, mono-alphabetic and poly-alphabetic substitution techniques: Vignere cipher, playfair cipher, Hill cipher, transposition techniques: keyed and keyless transposition ciphers, steganography). 09 CO1<\/p>\n<h4>Module II<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete Syllabus, results, class timetable, and many other features kindly download the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdf platform to make students&#8217;s lives easier.<\/b><br \/><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.  <\/p>\n<h4>Module III<\/h4>\n<p align=\"justify\">\nCryptographi c Hashes, Message Digests and Digital Certificates Authentication requirement &#8211; Authentication function , Types of Authentication, MAC -Hash function &#8211; Security of hash function and MAC -MD5 &#8211; SHA &#8211; HMAC &#8211; CMAC, Digital Certificate: X.509, PKI 09 CO3<\/p>\n<h4>Module IV<\/h4>\n<p align=\"justify\">\nDigital signature schemes and authenticatio n Protocols Digital signature and authentication protocols : Needham Schroeder Authentication protocol, Digital Signature Schemes &#8211; RSA, EI Gamal and Schnorr, DSS. 07 CO4<\/p>\n<h4>Module V<\/h4>\n<p align=\"justify\">\nNetwork Security Network security basics: TCP\/IP vulnerabilities (Layer wise), Packet Sniffing, ARP spoofing, port scanning, IP spoofing, TCP syn flood, DNS Spoofing. Denial of Service: Classic DOS attacks, Source Address spoofing, ICMP flood, SYN flood, UDP flood, Distributed Denial of Service, Defenses against Denial of Service Attacks. 10 CO5 Firewalls, Intrusion Detection Systems: Host Based and Network Based IDS, Honey pots.<\/p>\n<h4>Module VI<\/h4>\n<p id=\"istudy\" style=\"text-align:center\">For the complete Syllabus, results, class timetable, and many other features kindly download the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy\" target=\"_blank\" rel=\"noopener\">iStudy App<\/a><br \/><b> It is a lightweight, easy to use, no images, and no pdf platform to make students&#8217;s lives easier.<\/b><br \/><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=ini.istudy&amp;pcampaignid=pcampaignidMKT-Other-global-all-co-prtnr-py-PartBadge-Mar2515-1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/play.google.com\/intl\/en_us\/badges\/static\/images\/badges\/en_badge_web_generic.png\" alt=\"Get it on Google Play\" style=\"height:65px\"><\/a>.  <\/p>\n<h4>Text Books:<\/h4>\n<p align=\"justify\">\n<ol>\n<li>Mark Stamps Information Security Principles and Practice, Wiley<\/li>\n<li>William Stallings, Cryptography and Network Security, Principles and Practice, 6th Edition, Pearson Education, March 2013<\/li>\n<li>Behrouz A. Ferouzan, Cryptography &amp; Network Security, Tata Mc Graw Hill<\/li>\n<li>Bernard Menezes, Cryptography &amp; Network Security, Cengage Learning<\/li>\n<\/ol>\n<h4>Reference Books:<\/h4>\n<p align=\"justify\">\n<ol>\n<li>Applied Cryptography, Protocols Algorithms and Source Code in C, Bruce Schneier, Wiley.<\/li>\n<li>Cryptography and Network Security, Atul Kahate, Tata Mc Graw Hill.<\/li>\n<\/ol>\n<h4>Assessment:<\/h4>\n<p align=\"justify\">\nInternal Assessment for 20 marks: Consisting of Two Compulsory Class Tests Approximately 40% to 50% of syllabus content must be covered in First test and remaining 40% to 50% of syllabus contents must be covered in second test. <b>End Semester Theory Examination:<\/b> Some guidelines for setting the question papers are as:<\/p>\n<ul>\n<li>Weightage of each module in end semester examination is expected to be\/will be proportional to number of respective lecture hours mentioned in the syllabus.<\/li>\n<li>Question paper will comprise of total six questions, each carrying 20 marks.<\/li>\n<li>Q.1 will be compulsory and should cover maximum contents of the syllabus.<\/li>\n<li>Remaining question will be mixed in nature (for example if Q.2 has part<\/li>\n<ol type=\"i\">\n<li>from module 3 then part<\/li>\n<li>will be from any other module. (Randomly selected from all the modules)<\/li>\n<\/ol>\n<li>Total four questions need to be solved.<\/li>\n<\/ul>\n<p align=\"justify\">For detail syllabus of all other subjects of Information Technology (IT) 5th Sem 2018 regulation, visit <a href=\"..\/category\/it+5th-sem\">IT 5th Sem Subjects<\/a> syllabus for 2018 regulation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptography &amp; Network Security detailed syllabus scheme for Information Technology (IT), 2018 regulation has been taken from the University of Mumbai official website and presented for the Bachelor of Engineering [&hellip;]<\/p>\n","protected":false},"author":2351,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[37,84],"tags":[],"class_list":["post-13811","post","type-post","status-publish","format-standard","hentry","category-5th-sem","category-it"],"_links":{"self":[{"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/posts\/13811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/users\/2351"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/comments?post=13811"}],"version-history":[{"count":0,"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/posts\/13811\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/media?parent=13811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/categories?post=13811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspirenignite.com\/mh\/wp-json\/wp\/v2\/tags?post=13811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}