NE7202 NETWORK AND INFORMATION SECURITY
UNIT I INTRODUCTION
An Overview of Computer Security-Security Services-Security Mechanisms-Security AttacksAccess Control Matrix, Policy-Security policies, Confidentiality policies, Integrity policies and Hybrid policies.
UNIT II CRYPTOSYSTEMS & AUTHENTICATION
Classical Cryptography-Substitution Ciphers-permutation Ciphers-Block Ciphers-DES- Modes of Operation- AES-Linear Cryptanalysis, Differential Cryptanalysis- Hash Function - SHA 512- Message Authentication Codes-HMAC - Authentication Protocols -
\
UNIT III PUBLIC KEY CRYPTOSYSTEMS
Introduction to Public key Cryptography- Number theory- The RSA Cryptosystem and Factoring Integer- Attacks on RSA-The ELGamal Cryptosystem- Digital Signature Algorithm-Finite FieldsElliptic Curves Cryptography- Key management – Session and Interchange keys, Key exchange and generation-PKI
UNIT IV SYSTEM IMPLEMENTATION
Design Principles, Representing Identity, Access Control Mechanisms, Information Flow and Confinement Problem Secure Software Development: Secured Coding - OWASP/SANS Top Vulnerabilities - Buffer Overflows - Incomplete mediation - XSS - Anti Cross Site Scripting Libraries - Canonical Data Format - Command Injection - Redirection - Inference – Application Controls
UNIT V NETWORK SECURITY
Secret Sharing Schemes-Kerberos- Pretty Good Privacy (PGP)-Secure Socket Layer (SSL)Intruders – HIDS- NIDS - Firewalls - Viruses
REFERENCES:
1. William Stallings, “Cryptography and Network Security: Principles and Practices”, Third Edition, Pearson Education, 2006.
2. Matt Bishop ,“Computer Security art and science ”, Second Edition, Pearson Education, 2002
3. Wade Trappe and Lawrence C. Washington, “Introduction to Cryptography with Coding Theory” Second Edition, Pearson Education, 2007
4. Jonathan Katz, and Yehuda Lindell, Introduction to Modern Cryptography, CRC Press, 2007
5. Douglas R. Stinson, “Cryptography Theory and Practice”, Third Edition, Chapman & Hall/CRC, 2006
6. Wenbo Mao, “Modern Cryptography – Theory and Practice”, Pearson Education, First Edition, 2006. 7. Network Security and Cryptography, Menezes Bernard, Cengage Learning, New Delhi, 2011 8. Man Young Rhee, Internet Security, Wiley, 2003 9. OWASP top ten security vulnerabilities: http://xml.coverpages.org/OWASP-TopTen.pdf
No comments:
Post a Comment