Monday, November 16, 2015

NE7202 NETWORK AND INFORMATION SECURITY

NE7202         NETWORK AND INFORMATION SECURITY

UNIT I  INTRODUCTION

An Overview of Computer Security-Security Services-Security Mechanisms-Security AttacksAccess Control Matrix, Policy-Security policies, Confidentiality policies, Integrity policies and Hybrid policies.  

UNIT II  CRYPTOSYSTEMS & AUTHENTICATION

Classical Cryptography-Substitution Ciphers-permutation Ciphers-Block Ciphers-DES- Modes of Operation- AES-Linear Cryptanalysis, Differential Cryptanalysis- Hash Function - SHA 512- Message Authentication Codes-HMAC - Authentication Protocols -  
\
UNIT III  PUBLIC KEY CRYPTOSYSTEMS 

 Introduction to Public key Cryptography- Number theory- The RSA Cryptosystem and Factoring Integer- Attacks on RSA-The ELGamal  Cryptosystem- Digital Signature Algorithm-Finite FieldsElliptic Curves Cryptography- Key management – Session and Interchange keys, Key exchange and generation-PKI   

UNIT IV  SYSTEM IMPLEMENTATION

Design Principles, Representing Identity, Access Control Mechanisms, Information Flow and Confinement Problem Secure Software Development: Secured Coding - OWASP/SANS Top Vulnerabilities - Buffer Overflows  - Incomplete mediation - XSS - Anti Cross Site Scripting Libraries - Canonical Data Format - Command Injection - Redirection - Inference – Application Controls 

UNIT V  NETWORK SECURITY

Secret Sharing Schemes-Kerberos- Pretty Good Privacy (PGP)-Secure Socket Layer (SSL)Intruders – HIDS- NIDS - Firewalls - Viruses  

REFERENCES: 

1. William Stallings, “Cryptography and Network Security: Principles and Practices”, Third Edition, Pearson Education, 2006. 
2. Matt Bishop ,“Computer Security art and science ”, Second Edition, Pearson Education, 2002 
3. Wade Trappe and Lawrence C. Washington, “Introduction to Cryptography with Coding Theory” Second Edition, Pearson Education, 2007 
4. Jonathan Katz, and Yehuda Lindell, Introduction to Modern Cryptography, CRC Press, 2007 
5. Douglas R. Stinson, “Cryptography Theory and Practice”, Third Edition, Chapman & Hall/CRC, 2006  
6. Wenbo Mao, “Modern Cryptography – Theory and Practice”, Pearson Education, First Edition, 2006.  7. Network Security and Cryptography, Menezes Bernard, Cengage Learning, New Delhi, 2011 8. Man Young Rhee, Internet Security, Wiley, 2003 9. OWASP top ten security vulnerabilities: http://xml.coverpages.org/OWASP-TopTen.pdf 


No comments:

Post a Comment