Module - 1:
Services, Mechanisms and Attacks, The OSI Security Architecture, A Model for Network Security.
Symmetric Cipher Model, Substitution Techniques, Transposition Techniques, Rotol Machines,
Steganography.
Module - 2:
Simplified DES, Block Cipher Principles, The Data Encryption Standard, The Strength of DES,
Differential and Linear Cryptanalysis, Block Cipher Design Principles, Block Cipher Modes of
Operation.
Module - 3:
Groups, Rings, and Fields, Modular Arithmetic, Euclids Algorithm, Finite Fields of the Form GF (p),
Polynomial arithmetic, Finite Fields of the Form GF(2), Placement of Encryption Function, Traffic
Confidentially, Key Distribution, Random Number Generation,
Module - 4:
Testing for Primality, The Chinese Remainder Theorem, Discrete Logarithms, Principles of Public-Key
Cryptosystems, The RSA Algorithm, Prime Numbers, Fermats and Eulers Theorems.
Module 5:
Authentication Requirements, Authentication Functions, Message Authentication Codes, Hash Functions,
Security of Hash Functions and MACs.
Module - 6:
Pretty Good Privacy, S/MIME, Kerberos, X.509 Authentication Service.
Module - 7:
IP Security Overview, IP Security Architecture, Authentication Header, Encapsulating Security Payload,
Combining Security Associations, Key Management. Web Security Considerations, Secure Sockets Layer
and Transport Layer Security, Secure Electronic Transaction.
Text Book:
W.Stallings : Cryptography and Network Security : Principles and Practice, 3rd ed.
Pearson Education, New Delhi, 2005
TUTORIAL
CP 7043 - CRYPTOGRAPHY & NETWORK SECURITY
1.
2.
Discuss the security services of x.800 in the case of OSI Security Architecture.
3.
4.
5.
6.
7.
8.
9.
List and briefly define types of Cryptanalytic attacks based on what is known to the attacker.
10.
11.
12.
13.
14.
What is Stegarography?
15.
(a) Encrypt the message meet me at the usual place at then rather than eight
oclock
using the Hill Cipher with the key 9 4). Show your calculations
a. 7) and the result.
(b) Show the calculations for the corresponding decryption of the Cipher Text to recover the
original Plaintext.
16.
What is Sinphified DES? Explain S-DES key generation. S-DES Encryption & role of
function fk.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
Using the extended Euclids Algo, find the multiplicative inverse of:
1234 mod 4321
2414 mod 40902
30.
31.
For a user workstation in a typical business environment, list potential location for
confidentiality attacks.
32.
33.
What are the roles of the public & private key? Explain.
34.
35.
36.
37.
38.
What are there threats associated with user authentication over a network or internet?
39.
40.
41.
42.
43.
44.
45.
Using S-DES decsypt the string (10100010) using the key (0111111101)
byhand. Show intermediate results after each function (IP, Fk, SW, Fk, IP-1).
Then douta the find 4 bits of the plaintext string to a letter & the second 4 bits to
another letter where we encode A through P in base 2.
(i.c. A = 0000, B = 0001, ---, P = 1111).