Periods/week : 3 Periods & 1 Tut /week.                                                                  Ses. : 30 Exam : 70 Examination (Practical): 3hrs.                                                                                   Credits: 4

INTRODUCTION: The need for security-security approaches-principles of security-Plain Text and Cipher Text-substitution and Transposition Techniques-Encryption and Decryption-Symmetric and  Asymmetric Cryptography-Stenography-key range and key size-types of attacks
SYMMETRIC  KEY  CRYPTOGRAPHIC  ALGORITHMS:  Algorithm  types  and  modes-overview  of symmetric key cryptography-DES-IDEA-RC5-BLOWFISH-AES-Differential and Linear Cryptanalysis.

ASYMMETRIC KEY CRYPTOGRAPHIC ALGORITHMS: Overview of asymmetric key cryptography- RSA   algorithm-symmetric   and   asymmetric   key   cryptography   together-digital   signatures-knapsack algorithm-some other algorithms.
PUBLIC  KEY  INFRASTRUCTURE:  Introduction-Digital  certificates-  Private  Key  management-The
PKIX model-Public Key Cryptography Standards- XML, PKI and Security

INTERNET  SECURITY  PROTOCOLS:  Basic  concepts-SSL-SHTTP-TSP-SET-SSL  versus  SET-  3D
secure protocol-Electronic money-Email security-WAP security-security in GSM

USER      AUTHENTICATION      MECHANISMS:      Introduction-Authentication      basics-passwords- authentication tokens-certificate based authentication-biometrics authentication-kerberos-SSO approaches

PRACTICAL IMPLEMENTATIONS OF CRYPTOGRAPHY/SECURITY: Cryptographic solutions using
Java-Cryptographic solutions using Microsoft-cryptographic toolkits-security and operating systems NETWORK SECURITY: Brief Introduction to TCP/IP-  firewalls-IP  security-Virtual Private Networks- case studies on cryptography and security.

TEXT BOOK:
Cryptography and Network security,  Atul Kahate, Tata McGraw-Hill Pub company Ltd., New Delhi

REFERENCE BOOKS:
1)   Network Security Private Communication in a public world, Charlie Kaufman, Radia
Perlman & Mike Speciner,  Prentice Hall of India Private Ltd., New Delhi
2)    Network Security Essentials Applications and Standards, William Stallings, Pearson Education, New
Delhi
3)     Network Security: The Complete Reference by Roberta Bragg, Mark Phodes-Ousley, Keith Strassberg
Tata Mcgraw-Hill

REFERENCE:
1. HTML Black Book: The Programmer’s Complete HTML Reference Book-by Steven Holzner 
2. Core SERVLETS ANDJAVASERVER PAGES   VOLUME 2: CORE TECHNOLOGIES by Marty Hall and Larry Brown Pearson

tejus mahiCSE 4.2 SyllabusIT 4.2 SyllabusCryptography And Network Security Syllabus,CSE,CSE Syllabus,IT Syllabus
Periods/week : 3 Periods & 1 Tut /week.                                                                  Ses. : 30 Exam : 70 Examination (Practical): 3hrs.                                                                                   Credits: 4 INTRODUCTION: The need for security-security approaches-principles of security-Plain Text and Cipher Text-substitution and Transposition Techniques-Encryption and Decryption-Symmetric...