This course is part of the B.E. Computer Science Engineering curriculum under Anna University Regulation 2021. The knowledge from this course continues to be actively applied in professional software development.
Semester 5 (Third Year)
4 Credits
60 Lecture Hours
Course Overview
UniversityAnna University
Regulation2021
Semester5
Credits4
TypeCore
Units5
Course Objectives
1
To understand security concepts and classical encryption
2
To learn symmetric cipher algorithms
3
To understand asymmetric cryptography
4
To learn authentication and digital signatures
5
To understand cyber crimes and security measures
Syllabus
Detailed unit-wise breakdown of the course curriculum as per Anna University Regulation 2021.
1
INTRODUCTION TO SECURITY
12 Hours
Computer Security ConceptsOSI Security ArchitectureSecurity AttacksSecurity Services and MechanismsModel for Network SecurityClassical encryption – SubstitutionTranspositionSteganographyPerfect securityInformation TheoryProduct CryptosystemCryptanalysis
2
SYMMETRIC CIPHERS
12 Hours
Number theoryAlgebraic StructuresModular ArithmeticEuclid's algorithmGroups, Rings, FieldsFinite FieldsSDES and Block CiphersDES and Strength of DESDifferential and linear cryptanalysisBlock cipher modesAES evaluation criteriaPseudorandom Number GeneratorsRC4 and Key distribution
3
ASYMMETRIC CRYPTOGRAPHY
12 Hours
Mathematics of Asymmetric KeyPrimes and Primality TestingFactorizationEuler's totient functionFermat's and Euler's TheoremChinese Remainder TheoremRSA cryptosystemKey distribution and managementDiffie Hellman key exchangeElliptic curve arithmeticElliptic curve cryptography
4
INTEGRITY AND AUTHENTICATION
12 Hours
Authentication requirementsAuthentication function and MACHash functionHMAC, CMAC, SHADigital signature protocolsDSS and Schnorr SignatureElGamal cryptosystemEntity Authentication – BiometricsPasswords and Challenge ResponseKerberosKey managementX.509 Certificates
5
CYBER CRIMES AND CYBER SECURITY
12 Hours
Cyber Crime and Information SecurityClassifications of Cyber CrimesTools – Password CrackingKeyloggers and SpywaresSQL InjectionNetwork Access ControlCloud SecurityWeb SecurityWireless Security
Course Outcomes
Upon completion of this course, students will be able to:
CO1
Apply classical and modern encryption techniques
CO2
Implement symmetric cipher algorithms
CO3
Use asymmetric cryptography for secure communication
CO4
Design authentication and digital signature systems
CO5
Identify and prevent cyber security threats
Industry Application & Relevance
How the concepts learned in this course are applied in real-world software development projects across Banking, Healthcare, and Enterprise domains over 20+ years of experience.