SHIVAJI UNIVERSITY, KOLHAPUR – Syllabus w.e.f. 2014 - 15



Teaching Scheme: L: 3hrs/week Credits: 3


Unit 1 Symmetric Ciphers                                                                                                                  (5 )

Overview - Services, Mechanism and Attacks, The OSI security Architecture, A model for Network security, Classical Encryption techniques – Symmetric Cipher model, Substitution techniques, Transposition techniques, Rotor Machines, Steganography.


Unit 2 Block Cipher and Data Encryption Standard                                                                        (5)

Block Cipher and Data Encryption Standard - Simplified DES, Block cipher principles, The Data Encryption Standard, The strength of DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles, block cipher modes of operations.


Unit 3 Asymmetric Ciphers                                                                                                                (6)

Public Key Cryptography and RSA - Principles of Public Key Cryptosystems, The RSA Algorithm, Key Management, Diffie-Hellman Key Exchange,


Unit 4 Message Authentication, HASH Functions and Digital Signature                                         (8)

Authentication requirements, Authentication Functions, Hash Functions, MD5 algorithm, Digital Signatures, Digital Signature Standard.


Unit 5 Network Security Practice                                                                                                      (9)

Authentication Applications - Kerberos, X.509 Authentication Service, Electronic Mail Security- Pretty Good Privacy- Notation, operational description, S/MIME- overview, functionality, IP Security – IP Security Overview, IP Security Architecture, WEB Security - Web Security Considerations, Secure Electronic Transaction overview.


Unit 6 System Security                                                                                                                       (6)

Intruders - Intruders, Intruder detection, Password Management, Malicious Software - Viruses and Related Threats, Virus Countermeasures, Firewall - Firewall Design principles, Trusted systems.



1. Williams Stallings “Cryptography and Network security Principles and Practices” (Pearson Education).



1. Atul Kahate, “Cryptography and network security” – (TMGH).

2. Randy Weaver, Dawn Weaver, “Network Infrastructure Security” – Cengage Learning.

3. Menezes, A. J., P. C. Van Oorschot, and S. A. Vanstone, “Handbook of Applied Cryptography”

4. Schneier, Bruce, “Applied Cryptography: Protocols & Algorithms”