AC 19/3/2012 Item No. 4.83
UNIVERSITY OF MUMBAI
Syllabus for the T.Y. B. Sc. Sem. V & VI Program: T.Y.B.Sc. Subject: Information Technology
(with effect from the academic year 2012–2013)
Paper 1: Network Security Paper 2: *ASP.NET with C# Paper 3: Software Testing Paper 4: *Advanced Java Paper 5: *Linux Administration
Paper 1: *Internet Technologies Paper 2: Digital Signals and Systems Paper 3: *Datawarehousing Paper 4: Elective: IPR and Cyber Laws Project Management GIS
Paper V: Project Report Paper VI: Project Viva-Voce
CLASS: B. Sc (Information technology) Paper I; SUBJECT: Network Security Periods per week Lecture 1 Period is 50 minutes TW/Tutorial/Practical Evaluation System Theory Examination TW/Tutorial/Practical
Semester – V 5 3 Hours 2 -Marks 60 40
Cryptography: Introduction: Some Simple Cryptosystems, The Shift Cipher, The Substitution Cipher, The Affine Cipher, The Vigenere Cipher, The Hill Cipher, The Permutation Cipher, Stream Ciphers, Cryptanalysis, Cryptanalysis of the Affine Cipher, Cryptanalysis of the Substitution Cipher, Cryptanalysis of the Vigenere Cipher, Cryptanalysis of the LFSR-based Stream Cipher. Shannon’s Theory, Perfect Secrecy, Entropy, Huffman Encodings and Entropy, Properties of Entropy, Spurious Keys and Unicity Distance The Data Encryption Standard, Description of DES, An Example of DES Encryption, The DES Controversy, DES in Practice, DES Modes of Operation, A Time-memory Trade-off, Differential Cryptanalysis, An Attack on a 3-round DES, An Attack on a 6-round DES. Introduction to Public-key Cryptography, More Number Theory, The Euclidean Algorithm, The Chinese Remainder Theorem, Other Useful Facts, The RSA Cryptosystem, Implementing RSA, Probabilistic Primality Testing, Attacks On RSA, The Decryption Exponent, Partial Information Concerning Plaintext Bits, The Rabin Cryptosystem, Factoring Algorithms, The p - 1 Method, Dixon’s Algorithm and the Quadratic Sieve, Factoring Algorithms in Practice Unit-II Signature Schemes : Introduction, The ElGamal Signature Scheme, The Digital Signature Standard, One-time Signatures, Undeniable Signatures, Fail-stop Signatures Hash Functions Signatures and Hash Functions, Collision-free Hash Functions The Birthday Attack, A Discrete Log Hash Function, Extending Hash Functions, Hash Functions from Cryptosystems, The MD4 Hash Function, Timestamping. Key Distribution and Key Agreement Introduction, Key Predistribution , Blom’s Scheme, Diffie-Hellman Key Predistribution, Kerberos, Diffie-Hellman Key Exchange, The Station-to-station Protocol, MTI Key Agreement Protocols, Key Agreement Using Self-certifying Keys. Unit-III Security Trends, The OSI Security Architecture, Security Attacks, Security Services, Security Mechanisms, A Model for Network Security Unit-IV Authentication Applications: Kerberos, X.509 Authentication Service, Public-Key Infrastructure, Recommended Reading and Web Sites, Key Terms, Review Questions, and Problems, A Kerberos Encryption Techniques, Electronic Mail Security, Pretty Good Privacy, S/MIME, Key Terms, Review Questions, and Problems, A Data Compression Using Zip, Radix-64 Conversion, PGP Random Number Generation Unit-V IP Security: IP Security Overview, IP Security Architecture, Authentication Header, Encapsulating Security Payload, Combining Security Associations, Key
Management, Recommended Reading and Web Site, Key Terms, Web Security: Web Security Considerations, Secure Socket Layer and Transport Layer, Security, Secure Electronic Transaction. Unit-VI Intruders: Intrusion Detection, Password Management, Recommended Reading and Web Sites. Malicious Software: Viruses and Related Threats, Virus Countermeasures, Distributed Denial of Service Attacks. Firewalls: Firewall Design Principles, Trusted Systems, Common Criteria for Information Technology Security Evaluation.
Books: Cryptography: Theory and Practice, Douglas Stinson, CRC Press, CRC Press LLC (Unit I and...
Please join StudyMode to read the full document