MCA – IV SEMESTER

MCA 222 SYSTEM SECURITIES AND CRYPTOGRAPHY

LTPTotalCredits-4
4004Duration of Exam- Three hours

Basic Encryption and Decryption

Attackers and Types of threats, challenges for information security, Encryption Techniques, Classical Cryptographic Algorithms: Monoalphabetic Substituions such as the Casers Cipher, Cryptanalysis of Monoalphabetic ciphers, Polyalphabetic Ciphers such as Vigenere ; Vernam Cipher, Stream and Block Cipher

Number Theory

Prime Numbers, Greatest Common Divisor, Euclidean algorithm, Modular Arithmetic, Properties of Modular Arithmetic, Computing the inverse, Fermat’s Theorem, algorithm for computing inverses, Random number generation

Secret key Systems

The Data Encryption Standard(DES), Analyzing and Strengthening of DES, Introduction to Advance Encryption Standard (AES)

Key Management Protocols

Solving Key Distribution Problem, Diffie-Hellman Algorithm, Key Exchange with Public Key Cryptography

Public Key Encryption Systems

Public key Encryption, Rivets- Shamir- Adlman (RSA) Cryptosystem, elliptic curve cryptography, Rabin, ElGamal, Goldwasses- Micali , Blum-Goldwasser cryptosystem, The Digital Signature Standard (DSA), Security handshake pitfalls, Strong password protocols.

Hash Algorithms

Hash concept, description of Hash algorithms, Message Digest Algorithms such as MD4 and MD5, Secure Hash Algorithms such as SH1 and SHA2

Public Key Infrastructure (PKI)

Concept of digital Certificate, Certificate Authorities and its roles, X.509 Structure of Digital Certificate, Types of public key infrastructures

Introduction to Network Security

Network security Issues such as Impersonation, Message Confidentiality, Message Integrity, Code Integrity, Denial of Service, Securing Switches and Routers, Firewalls, DMZs, Virtual Private Networks, Network Monitoring and Diagnostic Devices, Virtual LANs, IPSec Secure Communication Mechanism, PKI based Authentication and Kerberos

Introduction to Web Security

Secure socket Layer protocol, Secure Electronic Transaction Protocol, Safe Guarding Web Servers, Secure Electronic Mail, Enhanced Email, Pretty Good Privacy, Public Key Cryptography Standards, Secure, SMIME

Suggested References

  1. A.J. Menezes .P. VAN OORSCHOT AND S. VANSTONE, “Handbook of Applied Cryptography”, CRC Press
  1. Principles of Cryptography, William Stallimgs, Pearson Education
  1. Cryptography & Network Security, Atul Kahate, TMH

DEPARTMENT OF COMPUTER APPLICATIONS, NIT Kurukshetra

Related Posts

आज से विश्व कप का आगाज: रिजर्व-डे से लेकर सुपरओवर तक, 17 पॉइंट्स में जानें इस टूर्नामेंट से जुड़ी हर ...
worldeye
October 6, 2023
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore ...
worldeye
January 23, 2022
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore ...
worldeye
January 23, 2022