Anda di halaman 1dari 5

Department of Information Technology Sona College of Technology, Salem 636 005.

Learning Objectives
VIII SEMESTER Cryptography and Network Security UNIT I Introduction Hours Topic required 1 OSI Security Architecture 2 Classical Encryption techniques Learning Objectives 3 4 5 Block cipher principles Data Encryption Standard (DES) Block cipher design principles Modes of operation Differentiate the terms security attack, security service, and security mechanisms. Define the requirements for network security. Describe the various classical encryption techniques like Caesar cipher, Playfair cipher, Hill cipher, Railfence cipher, Vernam cipher, and Viginere cipher Encrypt and decrypt messages using the above said techniques. Describe the various steganographic techniques. Describe the concepts of block ciphers. Differentiate block cipher with stream cipher. Describe S-DES encryption and decryption algorithm. Describe the DES encryption and decryption algorithm. Analyze the design criteria for complex function f in DES Analyze the design criteria for S- boxes in DES Analyze the design criteria for permutations in DES Analyze ECB mode of DES. Analyze CBC mode of DES. Analyze CFB mode of DES. Analyze OFB mode of DES. Analyze CNT mode of DES. Analyze the initial criteria security, cost & algorithm and implementation characteristics. Analyze the final criteria general security, software & hardware implementation ease, implementation attacks & flexibility. Describe the structure of AES. Describe the encryption and decryption details of AES Describe triple- DES with two keys & three keys. Describe link encryption & end-to-end encryption. Describe traffic analysis, key distribution issues.

Evaluation Criteria for Advanced Encryption Standard (AES)

7.5 8 9 9.5

AES Cipher Triple DES Placement of encryption function Traffic confidentiality

UNIT II Public Key Cryptography Hours Topic required 1 Key Management 2 Diffie Hellman Key Exchange Elliptic Curve Architecture and Cryptography Learning Objectives Analyze the methods of distribution of public keys. Analyze the methods of distribution of secret keys. Describe Diffie-Hellman key exchange algorithm. Solve a problem using Diffie-Hellman key exchange algorithm Describe the elliptic curve arithmetic elliptic curve equation, infinite point, adding two points, multiplying two points, scalar multiplication. Describe key exchanging using ECC. Describe encryption & decryption using ECC. Analyze the strength of ECC. Describe the modulo arithmetic principles Describe the prime number arithmetic. State & prove Fermats Theorem. State & prove Eulers Totient function & Theorem. State Chinese Remainder Theorem. Analyze the various issues in providing confidentiality using symmetric key cryptography Describe about public key cryptography Describe RSA encryption & decryption algorithm. Encrypt and decrypt the given message using RSA Analyze the strength of RSA algorithm.

4 5 6 7 8

Introduction to Number Theory

Confidentiality using Symmetric Key Cryptography Public Key Cryptography and RSA

UNIT III Authentication and Hash Functions Hours required 1 2 3 4 5 Topic Authentication requirements Authentication functionsMessage Authentication Code (MAC) & Hash functions Security of MAC & Hash functions MD5 Message Digest algorithm SHA Secure Hash Algorithm RIPEMD - RACE Integrity Primitives Evaluation Message Digest algorithm. HMAC - Hash-based Message Authentication Code algorithm Digital Signatures Learning Objectives Define authentication Define authentication requirements Describe MAC & its characteristics Describe Hash functions & its characteristics Analyze the strength of MACs and Hash functions. Describe the MD5 algorithm. Analyze the strength of MD5. Differentiate between MD5 and MD4. Describe the SHA algorithm. Analyze the strength of SHA. Differentiate the various versions of SHA Describe the RIPEMD algorithm. Analyze the strength of RIPEMD Describe HMAC algorithm. Analyze the strength of HMAC algorithm. Describe the properties Describe about arbitrated digital signatures Describe about direct digital signatures Describe & Analyze mutual authentication o Needham-Schroeder Protocol o Denning AS Protocol Describe & Analyze one way authentication o Using symmetric key o Using public key Describe and Analyze o DSA key generation o DSA signature generation o DSA signature verification

7 8 8.5

Authentication protocols Digital Signature Standard

UNIT IV Authentication Applications Hours required 1 Kerberos Topic 2 X.509 Authentication service Learning Objectives Describe Kerberos o Requirements o Authentication using Kerberos version 4 Analyze the shortcomings of Kerberos version 4 Describe o Authentication using Kerberos version 5 Describe o X.509 certificate format o Certificate hierarchy o Authentication using X.509 certificates Describe PGP message generation Describe PGP message reception Describe S/MIME functions Describe S/MIME cryptographic algorithms Describe o Benefits & Services o AH and ESP o Transport and tunnel modes Describe and analyze o Key management Oakley ISAKMP Describe and analyze o SSL o TLS

3 4 5 6

E-mail security: Pretty Good Privacy (PGP) E-mail security: S/MIME IP Security

Web Security

UNIT V System Level Security Hours Topic required 1 Intrusion detection Learning Objectives Describe and Analyze o Statistical anomaly detection o Rule based anomaly detection Describe distributed intrusion detection Describe the various ways of securing the passwords from hacking Describe o Malicious software categories o Virus phases o Types of viruses Describe o Prevention o Detection o Reaction o Advanced antivirus techniques Describe o Design goals & capabilities o Limitations o Types of firewalls o Firewall configurations Define trusted systems Describe reference monitors

2 3

Password management Viruses & related threats

Virus counter measures

5 6.5 0.5

Firewall design principles

Trusted Systems

Anda mungkin juga menyukai