Skip to Content
Cryptography & Network Security Semester VII
Course Code: BCS703
CIE Marks: 50
Teaching Hours/Week (L:T:P: S): 4:0:0:0
SEE Marks: 50
Total Hours of Pedagogy: 50
Total Marks: 100
Credits: 04
Exam Hours: 03
Examination type (SEE): Theory

A model for Network Security, Classical encryption techniques: Symmetric cipher model, Substitution ciphers-Caesar Cipher, Monoalphabetic Cipher, Playfair Cipher, Hill Cipher, Polyalphabetic Ciphers, One time pad, Steganography.

Block Ciphers and Data Encryption Standards: Traditional Block Cipher structures, data Encryption Standard (DES), A DES Example, The strength of DES, Block cipher design principles.

Chapter 1: 1.8 Chapter 3: 3.1, 3.2, 3.5 Chapter 4: 4.1, 4.2, 4.3, 4.4, 4.5

DOWNLOAD PDF DOWNLOAD WRITTEN

Pseudorandom number Generators: Linear Congruential Generators, Blum Blum Shub Generator.

Public key cryptography and RSA: Principles of public key cryptosystems-Public key cryptosystems, Applications for public key cryptosystems, Requirements for public key cryptography, Public key Cryptanalysis, The RSA algorithm: Description of the Algorithm, Computational aspects, The Security of RSA.

Diffie-Hellman key exchange: The Algorithm, Key exchange Protocols, Man-in-the-middle Attack, Elliptic Curve Cryptography: Analog of Diffie-Hellman key Exchange, Elliptic Curve Encryption/Decryption, Security of Elliptic Curve Cryptography.

Chapter 8: 8.2 Chapter 9: 9.1, 9.2 Chapter 10: 10.1, 10.4

DOWNLOAD PDF DOWNLOAD WRITTEN

Applications of Cryptographic Hash functions, Two simple Hash functions, Key management and distribution: Symmetric key distribution using symmetric encryption, Symmetric key distribution using asymmetric encryption, Distribution of public keys, X.509 Certificates, Public Key Infrastructures.

Chapter 11: 11.1, 11.2 Chapter 14: 14.1, 14.2, 14.3, 14.4, 14.5

DOWNLOAD PDF DOWNLOAD WRITTEN

User Authentication: Remote user authentication principles, Kerberos, Remote user authentication using asymmetric encryption.

Web security consideration, Transport layer security.

Email Threats and comprehensive email security, S/MIME, Pretty Good Privacy.

Chapter 15: 15.1, 15.3, 15.4 Chapter 17: 17.1, 17.2 Chapter 19: 19.3, 19.4, 19.5

DOWNLOAD PDF DOWNLOAD WRITTEN

Domainkeys Identified Mail.

IP Security: IP Security overview, IP Security Policy, Encapsulating Security Payload, Combining security associations, Internet key exchange.

Chapter 19: 19.9 Chapter 20: 20.1, 20.2, 20.3, 20.4, 20.5

DOWNLOAD PDF DOWNLOAD WRITTEN
2022 SCHEME QUESTION PAPER

Model Set 1 Paper

DOWNLOAD

Model Set 1 Paper Solution

DOWNLOAD

Model Set 2 Paper

DOWNLOAD

Model Set 2 Paper Solution

DOWNLOAD

Regular Paper

DOWNLOAD

Back Paper

DOWNLOAD

Recent Pages