August 13, 2011

MCA-506 Elective-III (E-III)E Network Security Syllabus

RAJIV GANDHI PROUDYOGIKI VISHWAVIDYALAYA
  (University of Technology of Madhya Pradesh)
 COURSE OF STUDY AND SCHEME OF EXAMINATION
MASTER OF COMPUTER APPLICATIONS (MCA)
W.E.F. 2005-2006
MCA-506 Elective-III (E-III)E Network Security Syllabus

 
UNIT-I
Classical Encryption Techniques: Symantec Cipher model, substitution Techniques, tranposition techniques, rotor machines, steganography.
Block Ciphers and the Data Encyption standards: Simplified DES, block cipher principles, the data encryption standard, the strength of DES, differential and linear cryptanalysis, block cipher design principles, block cipher modes of operation.
Advanced Encryption Standard: Evaluation Criteria for AES, the AES cipher.
Contemporary symmetric ciphers: Triple DES, blowfish.
Confidentiality using symmetric encryption: Placement of Encryption function, traffic confidentiality, key distribution, and random number generation.

UNIT-II
Public key Encryption and Hash functions : Prime numbers, Fermat’s and Euler’s Theorems, testing for primality, the chinese remainder theorem, discrete logarithms.
Public key cryptography and RSA: Principles of Public key cryptosystems, the RSA algorithm.
Key Management other public key cryptosystems: Key management, diffie-Hallman key exchange, elliptic curve arithmetic, and elliptic curve cryptography.

UNIT-III
Message authentication and Hash function : Authentication Requirements, Authentication functions, message authentication codes, hash functions, security of hash function and MACs.
Hash Algorithms: MD5 message digest algorithm, secure Hash algorithm, ripemd-160, HMAC.
Digital Signature and Authentication protocols: Digital signatures, Authentication protocols, and digital signature standard.
Authentication Applications: Kerberos, X.509 Authentication service.

UNIT-IV
Electronic Mail Security: Pretty Good privacy, S/MIME.
IP Security: IP Security overview, IP security architecture, authentication header, encapsulating security payload, combining security associations, key management.
Web Security: Web security considerations, Secure sockets layer and transport layer security, secure electronic transaction.

UNIT-V
Part four system security: Intruders, intrusion detection, and password management.
Malicious software: Viruses and related threats, virus countermeasures.
Firewalls: Firewall Design Principles, Trusted systems.

BOOKS
1.           William Stallings “Cryptography and Network Security”, 3 ed, Pearson Education.
2.           W.Stallings “ Network security Essential “ Applications & Standards”, Pearson ed.
3.           Kanfren “Network Secirity : Private Communications in a public world 2/e
4.           Eric Maiwald “ Network Secirity : A Preginner’s Guide, second ed.”, Tata Mcgraw Hill.
5.           Roberta Bragg “ Mark Rhodes, Ousley & Keith Strassberg  Network Secirity : The Complete Reference “ Tata McGraw Hill.
6.           Eric Maiwald “Fundamentals of Network Security” Wiley India.


0 comments:

Post a Comment

Search Engine Submission - AddMe