Skip to Content
DATA SECURITY AND PRIVACY Semester VII
Course Code: BAD703
CIE Marks: 50
Teaching Hours/Week (L:T:P: S): 4:0:0:0
SEE Marks: 50
Total Hours of Pedagogy: 50
Total Marks: 100
Credits: 04
Exam Hours: 3
Examination type (SEE): Theory

Module 1: 10 hours

A model for Network Security, Classical encryption techniques: Symmetric cipher model, Substitution ciphers-Caesar Cipher, Monoalphabetic Cipher, Playfair Cipher, Hill Cipher, Polyalphabetic Ciphers, One time pad, Steganography

Block Ciphers and Data Encryption Standards: Traditional Block Cipher structures, data Encryption Standard (DES), A DES Example, The strength of DES, Block cipher design principles

Text book 1:
Chapter 1: 1.8 Chapter 3: 3.1, 3.2, 3.5 Chapter 4: 4.1, 4.2, 4.3, 4.4, 4.5

DOWNLOAD PDF DOWNLOAD PDF

Module 2: 10 hours

Pseudorandom number Generators: Linear Congruential Generators, Blum Blum Shub Generator

Public key cryptography and RSA: Principles of public key cryptosystems-Public key cryptosystems, Applications for public key cryptosystems, Requirements for public key cryptography, Public key Cryptanalysis, The RSA algorithm: Description of the Algorithm, Computational aspects, The Security of RSA

Diffie-Hellman key exchange: The Algorithm, Key exchange Protocols, Man-in-the-middle Attack, Elliptic Curve Cryptography: Analog of Diffie-Hellman key Exchange, Elliptic Curve Encryption/Decryption, Security of Elliptic Curve Cryptography

Text book 1:
Chapter 8: 8.2 Chapter 9: 9.1, 9.2 Chapter 10: 10.1, 10.4

DOWNLOAD PDF DOWNLOAD PDF

Module 3: 10 hours

Key management fundamentals, Key lengths and lifetimes, Key generation, Key establishment, Key storage, Key usage, Governing key management.

Public-Key Management: Certification of public keys, The certificate lifecycle, Public-key management models, Alternative approaches.

Text book 2:
Chapter 10, Chapter 11

DOWNLOAD PDF DOWNLOAD PDF

Module 4: 10 hours

Web security consideration, Transport layer security.

IP Security: IP Security overview, IP Security Policy, Encapsulating Security Payload, Combining security associations, Internet key exchange.

Text book1:
Chapter 17: 17.1, 17.2 Chapter 20: 20.1, 20.2, 20.3 20.4, 20.5

DOWNLOAD PDF DOWNLOAD PDF

Module 5: 10 hours

Data Security: Data hiding in Text-Basic features, Applications of data hiding, Watermarking, Intuitive Methods, Simple Digital methods, Data hiding in Text, Innocuous Text, Mimic Functions.

Data hiding in Images: LSB encoding, BPCS Steganography, Lossless data hiding

Textbook 3:
Chapter 10: 10.1, 10.2, 10.3, 10.4, 10.5, 10.6, 10.7, 10.8
Chapter 11: 11.1, 11.2, 11.3

DOWNLOAD PDF DOWNLOAD PDF
2022 SCHEME QUESTION PAPER

Model Set 1 Paper

DOWNLOAD

Model Set 1 Paper Solution

DOWNLOAD

Model Set 2 Paper

DOWNLOAD

Model Set 2 Paper Solution

DOWNLOAD

Regular Paper

DOWNLOAD

Back Paper

DOWNLOAD

Recent Pages