Back close

Course Detail

Course Name Cryptography and Network Security
Course Code 25ES643
Program M. Tech. in Embedded Systems
Credits 3
Campus Bengaluru, Coimbatore

Syllabus

Syllabus

Classical Encryption Techniques Symmetric Cipher Model Steganography AES Cipher -Symmetric Cipher Multiple Encryption and triple DES Blocks Cipher stream Cipher Confidentiality using symmetric encryption Placement of encryption function random number generation Asymmetric encryption & key exchange- RSA, Diffie-Hellman key exchange, ECC basics. PKI and Digital Certificates X.509, Certificate Authorities. Introduction to number theory Cryptosystems message authentication and Hash functions requirements functions course Hash and MAC algorithms secure Hash algorithms Digital signatures and authentication protocols standard authentication applications overview architecture web security – socket layer and transport layer security Intruders Detection Malicious software viruses and related threats denial of service – counter measures firewalls design principles trusted systems – firmware security – IoT security.

Text Books / References
  1. William Stallings, “Cryptography and Network Security – Principles and Practices”, Seventh Edition, Prentice Hall, 2017. 
  2. Douglas R Stinson, “Cryptography: Theory and Practice”, Fourth Edition, Chapman and Hall/CRC, 2018. 
  3. Arshdeep Bahga, Vijay Madisetti, “Internet of Things – A hands-on approach”, Universities Press, 2015. 
  4. Mark Ciampa, “Security+ Guide to Network Security Fundamentals”, Fifth Edition, Cengage Learning, 2014. 

Objectives and Outcomes

Pre-requisite: Nil

Course Objectives:

  • To introduce classical and modern symmetric encryption techniques, cryptosystems, and secure hash functions.
  • To develop an understanding of digital signatures, authentication protocols, and web security mechanisms.
  • To provide knowledge on system security concepts including intrusion detection, malware, firewalls, and IoT security.

Course Outcomes:

CO1:

Understand various encryption techniques. 

CO2:

Understand the number theory in cryptographic schemes. 

CO3:

Illustrate various authentication protocols. 

CO4:

Analyse various software threats and counter measures. 

CO-PO Mapping:

PO/PSO

PO1

PO2

PO3

PSO1

PSO2

CO

CO1

CO2

CO3

CO4

DISCLAIMER: The appearance of external links on this web site does not constitute endorsement by the School of Biotechnology/Amrita Vishwa Vidyapeetham or the information, products or services contained therein. For other than authorized activities, the Amrita Vishwa Vidyapeetham does not exercise any editorial control over the information you may find at these locations. These links are provided consistent with the stated purpose of this web site.

Admissions Apply Now