UNIT - I
Security Concepts: Introduction, The need for security and Data Privacy, Security approaches, Principles of security, Types of Security attacks, Security services and mechanisms, A model for Network Security, Social Aspects of Privacy, Legal Aspects of Privacy and Privacy Regulations, Database Security, Statistical Database security, Inference Control, Hippocratic databases. Cryptography Concepts and Techniques: Introduction, plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography, steganography, key range and key size, possible types of attacks.
UNIT - II
Symmetric key Ciphers: Block Cipher principles, DES, AES, RC5, IDEA, Block cipher operation, Stream ciphers, RC4.
Asymmetric key Ciphers: Principles of public key cryptosystems, RSA algorithm, Elgamal Cryptography, Diffie-Hellman Key Exchange.
UNIT-III
Cryptographic Hash Functions: Message Authentication, Secure Hash Algorithm (SHA-512), Message authentication codes: Authentication requirements, HMAC, CMAC, Digital signatures, Elgamal Digital Signature Scheme.
Key Management and Distribution: Symmetric Key Distribution Using Symmetric & Asymmetric Encryption, Distribution of Public Keys, Kerberos, X.509 Authentication Service, Public – Key Infrastructure
UNIT-IV
Anonymization: Linkage and re-identification attacks, k-anonymity, I-diversity, t-closeness, implementing anonymization, Anonymizing complex data, Privacy and anonymity in mobile environments, Database as a service, Privacy in Cloud infrastructure
Differential Privacy (DP): Formalism and interpretation of DP, Fundamental DP mechanisms and properties, Interactive and non-interactive DP, DP for complex data Local Differential Privacy (LDP)
Text Books:
- Cryptography and Network Security - Principles and Practice: William Stallings, PearsonEducation, 6th Edition
- Cryptography and Network Security: Atul Kahate, Mc Graw Hill, 3rd Edition
- C. Dwork and A. Roth, The Algorithmic Foundations of Differential Privacy, now Publishers, 2014.
Reference Books:
- Cryptography and Network Security: C K Shyamala, N Harini, Dr T R Padmanabhan, WileyIndia, 1st Edition.
- Cryptography and Network Security: Forouzan Mukhopadhyay, Mc Graw Hill, 3rd Edition
- Information Security, Principles, and Practice: Mark Stamp, Wiley India.
- Charu C. Aggarwal, Privacy-Preserving Data Mining: Models and Algorithms, 1st Edition,Springer, 2008.
No comments:
Post a Comment