0% found this document useful (0 votes)
5 views2 pages

Is Syllabus

The document outlines the Information Security course (ITITE 02), which includes 4 credits and covers topics such as number theory, symmetric and public key cryptography, cryptographic hash functions, digital signatures, and network/system security. The course aims to equip students with knowledge in designing cryptographic algorithms and understanding security principles. Suggested readings include various texts on cryptography and network security.

Uploaded by

Mohammad Zeeshan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views2 pages

Is Syllabus

The document outlines the Information Security course (ITITE 02), which includes 4 credits and covers topics such as number theory, symmetric and public key cryptography, cryptographic hash functions, digital signatures, and network/system security. The course aims to equip students with knowledge in designing cryptographic algorithms and understanding security principles. Suggested readings include various texts on cryptography and network security.

Uploaded by

Mohammad Zeeshan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

ITITE 02: Information Security

Course Title of Credits L-T-P Pre- Requisites


No Course

Information 4 3L-0T-2P None


ITITE02
Security

COURSE OUTCOMES:

CO1: To learn number theory to understand the concepts of information security

CO2: To design the traditional and modern symmetric cryptographic algorithms

CO3: To apply number theory to the public key cryptographic algorithms and its cryptanalysis

CO4: To understand the notions related to integrity and authentication

CO5: To learn the concepts of network and system security

Unit No Topics

Unit 1 Number Theory

Groups, Rings, Finite Fields, Modular Arithmetic, Matrices, Linear Congruence,


Efficient Algorithms for Modular Arithmetic, Euler's Totient Function, Euler's
Theorem, Fermat's Little Theorem, Primality Testing, Prime Factorization,
Chinese Remainder theorem, Quadratic Congruence, Euler's Criteria,

Unit 2 Traditional and Modern Symmetric Ciphers

Traditional Ciphers: Affine Cipher, Autokey Cipher, Playfair Cipher, Vigenere


Cipher, Hill Cipher, Transposition Ciphers, Stream and Block Ciphers,

Modern Ciphers: Components of Modern Block Ciphers, Product ciphers,


Diffusion, Confusion, Fiestel and Non-Fiestel Ciphers, Linear and Differential
Cryptanalysis, Modern Stream Cipher, Blowfish, DES, AES

Unit 3 Public Key Cryptography

RSA, Knapsack, Rabin, ElGamal, Elliptic Curve, Diffie Hellman Key Exchange
algorithm, Lattice based Cryptography

Unit 4 Cryptographic Hash Function and Digital Signatures:

Hash functions and its properties, SHA-512, Digital Signature, Attacks on Digital
Signatures, Digital Signatures Schemes like RSA, ElGamal, Schnorr, DSS, ECC,
Variations and Applications.
Unit 5 Network and System Security

Network Security: Two Modes of IPSec, Two Security Protocols AH and ESP, Security
Association, Security Policy, Internet Key Exchange

System Security: Buffer Overflow and Malicious Software, Malicious Programs,


Worms, Viruses, Intrusion Detection System, Firewalls and its Types, Virtual Private
Networks

SUGGESTED READINGS:

1. B. A. Forouzan, "Cryptography & Network Security", Tata Mc Graw Hill.


2. J.Katz, Y.Lindell, Introduction to Modern Cryptography, Chapman Hall.
3. Wen Bo Mao, Modern cryptography - Theory and practice, Prentice Hall.
4. Douglas Stinson, "Cryptography Theory and Practice", Second Edition, Chapman &
Hall/CRC.
5. W. Stallings, "Cryptography and Network Security", Pearson Education

You might also like