Cryptography and Network Security detail syllabus for Telecommunication Engineering (Telecom), 2017 scheme is taken from VTU official website and presented for VTU students. The course code (17TE71), and for exam duration, Teaching Hr/week, Practical Hr/week, Total Marks, internal marks, theory marks, duration and credits do visit complete sem subjects post given below.
For all other telecom 7th sem syllabus for be 2017 scheme vtu you can visit Telecom 7th Sem syllabus for BE 2017 Scheme VTU Subjects. The detail syllabus for cryptography and network security is as follows.
Course Objectives:
The objectives of the course is to enable students to:
- Understand the basics of symmetric key and public key cryptography.
- Know basic mathematical concepts and pseudorandom number generators required for cryptography.
- Understand the concepts of authentication and data integrity
- Acquire knowledge about Email, IP and Web security.
Module 1
For complete syllabus and results, class timetable and more pls download iStudy. Its a light weight, easy to use, no images, no pdfs platform to make students life easier.
Module 2
SYMMETRIC CIPHERS: Traditional Block Cipher structure, Data encryption standard (DES), The AES Cipher. (Text 1: Chapter 2: Section1, 2, Chapter 4: Section 2, 3, 4) ASYMMETRIC CIPHERS: Principles of Public-Key Cryptosystems, The RSA algorithm, Diffie – Hellman Key Exchange, Elliptic Curve Arithmetic, Elliptic Curve Cryptography (Text 1: Chapter 8, Chapter 9: Section 1, 3, 4)
Module 3
One-Way Hash Functions: Background, Snefru, N-Hash, MD4, MD5, Secure Hash Algorithm [SHA],One way hash functions using symmetric block algorithms, Using public key algorithms, Choosing a one-way hash functions, Message Authentication Codes. Digital Signature Algorithm, Discrete Logarithm Signature Scheme (Text 2: Chapter 18: Section 18.1 to 18.5, 18.7, 18.11 to 18.14 and Chapter 20: Section 20.1, 20.4)
Module 4
For complete syllabus and results, class timetable and more pls download iStudy. Its a light weight, easy to use, no images, no pdfs platform to make students life easier.
Module 5
E-mail Security: Pretty Good Privacy-S/MIME (Text 1: Chapter 17: Section 1, 2)
IP Security: IP Security Overview, IP Security Policy, Encapsulation Security Payload (ESP), Combining security Associations Internet Key Exchange. Cryptographic Suites (Text 1: Chapter 18)
Course Outcomes:
At the end of the course, the students will be able to:
- Use basic cryptographic algorithms to encrypt the data.
- Generate some pseudorandom numbers required for cryptographic applications.
- Understand concept of data authentication and integrity.
- Explain network security protocols.
Text Books:
- William Stallings , Cryptography and Network Security Principles and Practice, Pearson Education Inc., 6th Edition, 2014, ISBN: 978-93-3251877-3
- Bruce Schneier, Applied Cryptography Protocols, Algorithms, and Source code in C, Wiley Publications, 2nd Edition, ISBN: 9971-51-348-X
Reference Books:
- Cryptography and Network Security, Behrouz A. Forouzan, TMH, 2007.
- Cryptography and Network Security, AtulKahate, TMH, 2003
For detail syllabus of all other subjects of BE Telecom, 2017 scheme do visit Telecom 7th Sem syllabus for 2017 scheme.
Dont forget to download iStudy for latest syllabus and results, class timetable and more.