Cryptography and Network Security

 UNIT - I

Security Concepts: Introduction, The need for security and Data Privacy, Security approaches, Principles of security, Types of Security attacks, Security services and mechanisms, A model for Network Security, Social Aspects of Privacy, Legal Aspects of Privacy and Privacy Regulations, Database Security, Statistical Database security, Inference Control, Hippocratic databases. Cryptography Concepts and Techniques: Introduction, plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography, steganography, key range and key size, possible types of attacks.

UNIT - II

Symmetric key Ciphers: Block Cipher principles, DES, AES, RC5, IDEA, Block cipher operation, Stream ciphers, RC4. 

Asymmetric key Ciphers: Principles of public key cryptosystems, RSA algorithm, Elgamal Cryptography, Diffie-Hellman Key Exchange.

UNIT-III

Cryptographic Hash Functions: Message Authentication, Secure Hash Algorithm (SHA-512), Message authentication codes: Authentication requirements, HMAC, CMAC, Digital signatures, Elgamal Digital Signature Scheme.

Key Management and Distribution: Symmetric Key Distribution Using Symmetric & Asymmetric Encryption, Distribution of Public Keys, Kerberos, X.509 Authentication Service, Public – Key Infrastructure

UNIT-IV

Anonymization: Linkage and re-identification attacks, k-anonymity, I-diversity, t-closeness, implementing anonymization, Anonymizing complex data, Privacy and anonymity in mobile environments, Database as a service, Privacy in Cloud infrastructure

Differential Privacy (DP): Formalism and interpretation of DP, Fundamental DP mechanisms and properties, Interactive and non-interactive DP, DP for complex data Local Differential Privacy (LDP)


Text Books:

  1. Cryptography and Network Security - Principles and Practice: William Stallings, PearsonEducation, 6th Edition
  2. Cryptography and Network Security: Atul Kahate, Mc Graw Hill, 3rd Edition
  3. C. Dwork and A. Roth, The Algorithmic Foundations of Differential Privacy, now Publishers, 2014.

Reference Books:

  1. Cryptography and Network Security: C K Shyamala, N Harini, Dr T R Padmanabhan, WileyIndia, 1st Edition.
  2. Cryptography and Network Security: Forouzan Mukhopadhyay, Mc Graw Hill, 3rd Edition
  3. Information Security, Principles, and Practice: Mark Stamp, Wiley India.
  4. Charu C. Aggarwal, Privacy-Preserving Data Mining: Models and Algorithms, 1st Edition,Springer, 2008.

No comments:

Post a Comment