You are on page 1of 1

ABES Engineering College

Department of Computer Application


CRYPTOGRAPHY AND NETWORK SECURITY MCA 404 / (2)

Sessional-1
Unit Topic lectures
No. Reqd.
1 Introduction to cryptography: Attacks ,services ,mechanisms, security attacks, security 01
services
Conventional Encryption: Classical Techniques, 02
Conventional Encryption Model, Steganography 01
Classical Encryption Techniques 01
Modern Techniques: Simplified DES 01
Block Cipher Principles 01
DES standard, DES strength 01
Differential & Linear cryptanalysis 01
Block cipher Design principles, Block Cipher Modes of operation 01
2 Conventional Encryption Algorithms: Triple DES 01
Blowfish, International Data Encryption Algorithm 01
RCS, CAST-128 01
RC2Placement & Encryption Function 01
Key Distribution, Random Number Generation 01
Placement of Encryption Function 01

Sessional-2
3 Public Key Encryption: Public Key cryptography: Principles of public key 01
cryptosystems
RSA Algorithm, Key Management 02
Fermat’s & Euler’s Theorem, 02
Primality, The Chinese Remainder Theorem 02
The Chinese Remainder Theorem 02
4 Hash Function: Message Authentication &hash function: Authentication Requirement, 01
Authentication function
Message authentication codes, Hash Functions, birthday Attacks 02
Security of Hash Function & MACS 01
MD5 Message Digest Algorithm 01
Secure Hash algorithm 01
Digital signatures: Digital Signatures, Authentication protocol 01
Digital Signature Standard(DSS) 01
Proof of Digital Signatures algorithm 01
5 Network & System security: Authentication applications:Kerberos X.509, 01
Directory Authentication Service,Electronic Mail Security, 01
Pretty Good Privacy(PGP),S/MIME 01
Security:Architecture,Authentication Header, Encapsulating Security payloads 01
Combining Security Associations,Key Management 01
Web Security:Secure Socket Layer&Transport Layer Security 01
Secure Electronic Transaction(SET) 01
System Security:Intruders,Viruses,Firewall Design Principles,Trusted Systems 01
Text Book:
1. William Stallings, “Cryptography and Network Security: (All Assignments are to be submitted within 3 days )
Principles and Practice”, Prentice Hall,New Jersey.
Reference Books:
1. Johannes A. Buchmann, “Introduction to cryptography”,Springer- Verlag.
2. Atul Kahate, “Cryptography and Network Security”, TMH

HOD, MCA Dept. (K. Anuradha)

You might also like