MCA – IV SEMESTER

 

MCA 222 SYSTEM SECURITIES AND CRYPTOGRAPHY

 

 

L T P Total Credits-4
4 0 0 4 Duration of Exam- Three hours

 

 

 

 

Basic Encryption and Decryption

 

Attackers and Types of threats, challenges for information security, Encryption Techniques, Classical Cryptographic Algorithms: Monoalphabetic Substituions such as the Casers Cipher, Cryptanalysis of Monoalphabetic ciphers, Polyalphabetic Ciphers such as Vigenere ; Vernam Cipher, Stream and Block Cipher

 

Number Theory

 

Prime Numbers, Greatest Common Divisor, Euclidean algorithm, Modular Arithmetic, Properties of Modular Arithmetic, Computing the inverse, Fermat’s Theorem, algorithm for computing inverses, Random number generation

 

Secret key Systems

 

The Data Encryption Standard(DES), Analyzing and Strengthening of DES, Introduction to Advance Encryption Standard (AES)

 

Key Management Protocols

 

Solving Key Distribution Problem, Diffie-Hellman Algorithm, Key Exchange with Public Key Cryptography

 

Public Key Encryption Systems

 

Public key Encryption, Rivets- Shamir- Adlman (RSA) Cryptosystem, elliptic curve cryptography, Rabin, ElGamal, Goldwasses- Micali , Blum-Goldwasser cryptosystem, The Digital Signature Standard (DSA), Security handshake pitfalls, Strong password protocols.

 

Hash Algorithms

 

Hash concept, description of Hash algorithms, Message Digest Algorithms such as MD4 and MD5, Secure Hash Algorithms such as SH1 and SHA2

Public Key Infrastructure (PKI)

 

Concept of digital Certificate, Certificate Authorities and its roles, X.509 Structure of Digital Certificate, Types of public key infrastructures

 

Introduction to Network Security

 

Network security Issues such as Impersonation, Message Confidentiality, Message Integrity, Code Integrity, Denial of Service, Securing Switches and Routers, Firewalls, DMZs, Virtual Private Networks, Network Monitoring and Diagnostic Devices, Virtual LANs, IPSec Secure Communication Mechanism, PKI based Authentication and Kerberos

 

Introduction to Web Security

 

Secure socket Layer protocol, Secure Electronic Transaction Protocol, Safe Guarding Web Servers, Secure Electronic Mail, Enhanced Email, Pretty Good Privacy, Public Key Cryptography Standards, Secure, SMIME

 

 

 

Suggested References

 

  1. A.J. Menezes .P. VAN OORSCHOT AND S. VANSTONE, “Handbook of Applied Cryptography”, CRC Press

 

  1. Principles of Cryptography, William Stallimgs, Pearson Education

 

  1. Cryptography & Network Security, Atul Kahate, TMH

DEPARTMENT OF COMPUTER APPLICATIONS, NIT Kurukshetra

Leave a Reply

Leave a Reply

Your email address will not be published.