Network Security and Cryptography (BTCS 701-18)

Course Objectives

This course aims to:

Course Outcomes

Upon completion of this course, students will be able to:

  1. Identify and assess security threats and vulnerabilities in computer networks.
  2. Understand and apply various cryptographic algorithms for data confidentiality, integrity, and authentication.
  3. Design and implement security mechanisms for network protocols and applications.
  4. Evaluate the effectiveness of different security solutions.
  5. Stay updated with the latest trends and developments in network security and cryptography.

Detailed Syllabus

Module 1: Introduction to Network Security

Module 2: Block Ciphers & Public Key Cryptography

Module 3: Cryptographic Hash Functions & Message Authentication

Module 4: Network Security & Email Security

Module 5: IP Security & Web Security

Module 6: System Security

Textbooks

Reference Books


Network Security and Cryptography Lab (BTCS 605-18)

List of Experiments (Expandable)

  1. Implement the following algorithms in C/C++/Java
    • Caesar Cipher
    • Monoalphabetic Cipher
    • Playfair Cipher
    • Hill Cipher
    • Vigenere Cipher
    • Rail Fence Cipher
    • Row Transposition Cipher
    • Simple Columnar Transposition Cipher
    • Vernam Cipher
    • Diffie-Hellman Key Exchange
    • RSA Algorithm
  2. Implement the following using any programming language:
    • MD5
    • SHA-1
  3. Implement Digital Signature Algorithm

Course Outcomes

Upon completion of this lab, students will be able to:

  1. Implement and analyze various cryptographic algorithms.
  2. Understand the strengths and weaknesses of different cryptographic techniques.
  3. Apply cryptographic algorithms to secure data and communications.