ITITE 02: Information Security
Course Title of Credits L-T-P Pre- Requisites
No Course
Information 4 3L-0T-2P None
ITITE02
Security
COURSE OUTCOMES:
CO1: To learn number theory to understand the concepts of information security
CO2: To design the traditional and modern symmetric cryptographic algorithms
CO3: To apply number theory to the public key cryptographic algorithms and its cryptanalysis
CO4: To understand the notions related to integrity and authentication
CO5: To learn the concepts of network and system security
Unit No Topics
Unit 1 Number Theory
Groups, Rings, Finite Fields, Modular Arithmetic, Matrices, Linear Congruence,
Efficient Algorithms for Modular Arithmetic, Euler's Totient Function, Euler's
Theorem, Fermat's Little Theorem, Primality Testing, Prime Factorization,
Chinese Remainder theorem, Quadratic Congruence, Euler's Criteria,
Unit 2 Traditional and Modern Symmetric Ciphers
Traditional Ciphers: Affine Cipher, Autokey Cipher, Playfair Cipher, Vigenere
Cipher, Hill Cipher, Transposition Ciphers, Stream and Block Ciphers,
Modern Ciphers: Components of Modern Block Ciphers, Product ciphers,
Diffusion, Confusion, Fiestel and Non-Fiestel Ciphers, Linear and Differential
Cryptanalysis, Modern Stream Cipher, Blowfish, DES, AES
Unit 3 Public Key Cryptography
RSA, Knapsack, Rabin, ElGamal, Elliptic Curve, Diffie Hellman Key Exchange
algorithm, Lattice based Cryptography
Unit 4 Cryptographic Hash Function and Digital Signatures:
Hash functions and its properties, SHA-512, Digital Signature, Attacks on Digital
Signatures, Digital Signatures Schemes like RSA, ElGamal, Schnorr, DSS, ECC,
Variations and Applications.
Unit 5 Network and System Security
Network Security: Two Modes of IPSec, Two Security Protocols AH and ESP, Security
Association, Security Policy, Internet Key Exchange
System Security: Buffer Overflow and Malicious Software, Malicious Programs,
Worms, Viruses, Intrusion Detection System, Firewalls and its Types, Virtual Private
Networks
SUGGESTED READINGS:
1. B. A. Forouzan, "Cryptography & Network Security", Tata Mc Graw Hill.
2. J.Katz, Y.Lindell, Introduction to Modern Cryptography, Chapman Hall.
3. Wen Bo Mao, Modern cryptography - Theory and practice, Prentice Hall.
4. Douglas Stinson, "Cryptography Theory and Practice", Second Edition, Chapman &
Hall/CRC.
5. W. Stallings, "Cryptography and Network Security", Pearson Education