Network Security and Cryptography (BTCS 701-18)

Course Outcomes

After undergoing this course, the students will be able to:

  1. CO1: Understand the fundamental principles of access control models and techniques, authentication and secure system design.
  2. CO2: Have a strong understanding of different cryptographic protocols and techniques and be able to use them.
  3. CO3: Apply methods for authentication, access control, intrusion detection and prevention.
  4. CO4: Identify and mitigate software security vulnerabilities in existing systems.

Detailed Syllabus

UNIT 1: Introduction (3 Hours) - CO1

Duration: 5 hours

UNIT 2: Math Background - CO1

Duration: 5 hours

UNIT 3: Cryptography - CO2

Duration: 12 hours

UNIT 4: Hash and MAC Algorithms - CO3

Duration: 6 hours

UNIT 5: Security in Networks - CO4

Duration: 7 hours

Suggested Readings / Books

  1. Cryptography And Network Security Principles And Practice (Fourth Edition) by William Stallings, Pearson Education
  2. Modern Cryptography: Theory and Practice by Wenbo Mao, Prentice Hall PTR
  3. Network Security Essentials: Applications and Standards by William Stallings, Prentice Hall
  4. Cryptography: Theory and Practice by Douglas R. Stinson, CRC press

Network Security and Cryptography Lab (BTCS 605-18)

List of Experiments (Expandable)

  1. Implement the following algorithms in C/C++/Java
    • Caesar Cipher
    • Monoalphabetic Cipher
    • Playfair Cipher
    • Hill Cipher
    • Vigenere Cipher
    • Rail Fence Cipher
    • Row Transposition Cipher
    • Simple Columnar Transposition Cipher
    • Vernam Cipher
    • Diffie-Hellman Key Exchange
    • RSA Algorithm
  2. Implement the following using any programming language:
    • MD5
    • SHA-1
  3. Implement Digital Signature Algorithm

Course Outcomes

Upon completion of this lab, students will be able to:

  1. Implement and analyze various cryptographic algorithms.
  2. Understand the strengths and weaknesses of different cryptographic techniques.
  3. Apply cryptographic algorithms to secure data and communications.