CB3491- Cryptography And Cyber Security Syllabus Regulation 2021 Anna University

Anna University, Subject code – CB3491, deals with the B.E Computer Science and Engineering  Semester -V Cryptography And Cyber Security syllabus regulation 2021 relating to affiliated institutions. From here, Students can get assistance in preparing notes to excel in academic performance.

We include every topic of the Cryptography And Cyber Security Syllabus, to understand the subject very well. It will help you to improve your idea of syllabus of CB3491-Cryptography And Cyber Security Syllabus on your finger tips to go ahead in a clear path of preparation. In this following article Cryptography And Cyber Security Syllabus, will help you, Hope you share with your friends.

If you want to know more about the syllabus of B.E Computer Science and Engineering connected to an affiliated institution’s under four-year undergraduate degree programme. We provide you with a detailed Year-wise, semester-wise, and Subject-wise syllabus in the following link B.E Computer Science and Engineering Syllabus Anna University, Regulation 2021.

Aim Of Concept:

  • Learn to analyze the security of in-built cryptosystems.
  • Know the fundamental mathematical concepts related to security.
  • Develop cryptographic algorithms for information security.
  • Comprehend the various types of data integrity and authentication schemes
  • Understand cyber crimes and cyber security.

CB3491- Cryptography And Cyber Security Syllabus

Unit I: Introduction To Security

Computer Security Concepts – The OSI Security Architecture – Security Attacks – Security Services and Mechanisms – A Model for Network Security – Classical encryption techniques: Substitution techniques, Transposition techniques, Steganography – Foundations of modern Cryptography: Perfect security – Information Theory – Product Cryptosystem – Cryptanalysis.

Unit II: Symmetric Ciphers

Number theory – Algebraic Structures – Modular Arithmetic – Euclid‘s algorithm – Congruence and matrices – Group, Rings, Fields, Finite Fields SYMMETRIC KEY CIPHERS: SDES – Block Ciphers – DES, Strength of DES – Differential and linear cryptanalysis – Block cipher design principles – Block cipher mode of operation – Evaluation criteria for AES – Pseudorandom Number Generators – RC4 – Key distribution.

Unit III: Asymmetric Cryptography

MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing – Factorization – Euler’s totient function, Fermat’s and Euler’s Theorem – Chinese Remainder Theorem – Exponentiation and logarithm ASYMMETRIC KEY CIPHERS: RSA cryptosystem – Key distribution – Key management – Diffie Hellman key exchange -– Elliptic curve arithmetic – Elliptic curve cryptography.

CB3491- Cryptography And Cyber Security Syllabus Regulation 2021 Anna University

Unit IV: Integrity And Authentication Algorithms

Authentication requirement – Authentication function – MAC – Hash function – Security of hash function: HMAC, CMAC – SHA – Digital signature and authentication protocols – DSS – Schnorr Digital Signature Scheme – ElGamal cryptosystem – Entity Authentication: Biometrics, Passwords, Challenge Response protocols – Authentication applications – Kerberos MUTUAL TRUST: Key management and distribution – Symmetric key distribution using symmetric and asymmetric encryption – Distribution of public keys – X.509 Certificates.

Unit V: Cyber Crimes And Cyber Security

Cyber Crime and Information Security – classifications of Cyber Crimes – Tools and Methods – Password Cracking, Keyloggers, Spywares, SQL Injection – Network Access Control – Cloud Security – Web Security – Wireless Security

Text Books:

  1. William Stallings, “Cryptography and Network Security – Principles and Practice”, Seventh Edition, Pearson Education, 2017.
  2. Nina Godbole, Sunit Belapure, “Cyber Security: Understanding Cyber crimes, Computer Forensics and Legal Perspectives”, First Edition, Wiley India, 2011.

References:

  1. Behrouz A. Ferouzan, Debdeep Mukhopadhyay, “Cryptography and Network Security”, 3rd Edition, Tata Mc Graw Hill, 2015.
  2. Charles Pfleeger, Shari Pfleeger, Jonathan Margulies, “Security in Computing”, Fifth Edition, Prentice Hall, New Delhi, 2015.

Related Posts On Semester -V: