Home/Degree/CB3491
Back to Degree
CB3491Actively Used

Cryptography and Cyber Security

This course is part of the B.E. Computer Science Engineering curriculum under Anna University Regulation 2021. The knowledge from this course continues to be actively applied in professional software development.

Semester 5 (Third Year)
4 Credits
60 Lecture Hours

Course Overview

  • UniversityAnna University
  • Regulation2021
  • Semester5
  • Credits4
  • TypeCore
  • Units5

Course Objectives

1

To understand security concepts and classical encryption

2

To learn symmetric cipher algorithms

3

To understand asymmetric cryptography

4

To learn authentication and digital signatures

5

To understand cyber crimes and security measures

Syllabus

Detailed unit-wise breakdown of the course curriculum as per Anna University Regulation 2021.

1

INTRODUCTION TO SECURITY

12 Hours
Computer Security ConceptsOSI Security ArchitectureSecurity AttacksSecurity Services and MechanismsModel for Network SecurityClassical encryption – SubstitutionTranspositionSteganographyPerfect securityInformation TheoryProduct CryptosystemCryptanalysis
2

SYMMETRIC CIPHERS

12 Hours
Number theoryAlgebraic StructuresModular ArithmeticEuclid's algorithmGroups, Rings, FieldsFinite FieldsSDES and Block CiphersDES and Strength of DESDifferential and linear cryptanalysisBlock cipher modesAES evaluation criteriaPseudorandom Number GeneratorsRC4 and Key distribution
3

ASYMMETRIC CRYPTOGRAPHY

12 Hours
Mathematics of Asymmetric KeyPrimes and Primality TestingFactorizationEuler's totient functionFermat's and Euler's TheoremChinese Remainder TheoremRSA cryptosystemKey distribution and managementDiffie Hellman key exchangeElliptic curve arithmeticElliptic curve cryptography
4

INTEGRITY AND AUTHENTICATION

12 Hours
Authentication requirementsAuthentication function and MACHash functionHMAC, CMAC, SHADigital signature protocolsDSS and Schnorr SignatureElGamal cryptosystemEntity Authentication – BiometricsPasswords and Challenge ResponseKerberosKey managementX.509 Certificates
5

CYBER CRIMES AND CYBER SECURITY

12 Hours
Cyber Crime and Information SecurityClassifications of Cyber CrimesTools – Password CrackingKeyloggers and SpywaresSQL InjectionNetwork Access ControlCloud SecurityWeb SecurityWireless Security

Course Outcomes

Upon completion of this course, students will be able to:

CO1

Apply classical and modern encryption techniques

CO2

Implement symmetric cipher algorithms

CO3

Use asymmetric cryptography for secure communication

CO4

Design authentication and digital signature systems

CO5

Identify and prevent cyber security threats

Industry Application & Relevance

How the concepts learned in this course are applied in real-world software development projects across Banking, Healthcare, and Enterprise domains over 20+ years of experience.

Professional Application

Banking security, encryption, secure coding practices

Textbooks & References

Textbooks

  • William Stallings, 'Cryptography and Network Security', Pearson
  • Behrouz A. Forouzan, 'Cryptography and Network Security', McGraw Hill

Reference Books

  • Bruce Schneier, 'Applied Cryptography', Wiley
  • Nina Godbole, 'Information Systems Security', Wiley