Gujarat Technological University: Page 1 of 6
Gujarat Technological University: Page 1 of 6
Gujarat Technological University: Page 1 of 6
Bachelor of Engineering
Subject Code: 3161606
Semester – VI
Subject Name: Cryptography and Network
security
Type of course: core
Rationale: The use of the Internet for various purpose including social, business, communication and
other day to day activities has been in common place. The information exchanged through Internet plays
vital role for their owners and the security of such information/data is of prime importance. Knowing the
concepts, principles and mechanisms for providing security to the information/data is very important for
the students of Computer Engineering/Information technology. The subject covers various important
topics concern to information security like symmetric and asymmetric cryptography, hashing, message
and user authentication, digital signatures, key distribution and overview of the malware technologies.
The subject also covers the applications of all of these in real life applications.
Content:
2 Stream ciphers and block ciphers, Block Cipher structure, Data 5 10%
Encryption standard (DES) with example, strength of DES, Design
principles of block cipher, AES with structure, its transformation
functions, key expansion, example and implementation
Page 1 of 6
w.e.f. AY 2018-19
GUJARAT TECHNOLOGICAL UNIVERSITY
Bachelor of Engineering
Subject Code: 3161609
4 Public Key Cryptosystems with Applications, Requirements and 7 15%
Cryptanalysis, RSA algorithm, its computational aspects and
security, Diffie-Hillman Key Exchange algorithm, Man-in-Middle
attack
5 Cryptographic Hash Functions, their applications, Simple hash 4 10%
functions, its requirements and security, Hash functions based on
Cipher Block Chaining, Secure Hash Algorithm (SHA)
6 Message Authentication Codes, its requirements and security, 3 10%
MACs based on Hash Functions, Macs based on Block Ciphers
7 Digital Signature, its properties, requirements and security, various 4 8%
digital signature schemes (Elgamal and Schnorr), NIST digital
Signature algorithm
8 Key management and distribution, symmetric key distribution 4 7%
using symmetric and asymmetric encryptions, distribution of public
keys, X.509 certificates, Public key infrastructure
9 Remote user authentication with symmetric and asymmetric 4 5%
encryption, Kerberos
10 Web Security threats and approaches, SSL architecture and 5 10%
protocol, Transport layer security, HTTPS and SSH
w.e.f. AY 2018-19
GUJARAT TECHNOLOGICAL UNIVERSITY
Bachelor of Engineering
Subject Code: 3161609
cryptanalytic and brute force attack.
Books
1. Cryptography And Network Security, Principles And Practice Sixth Edition, William
Stallings, Pearson
2. Information Security Principles and Practice By Mark Stamp, Willy India Edition
3. Cryptography & Network Security, Forouzan, Mukhopadhyay, McGrawHill
4. Cryptography and Network Security Atul Kahate, TMH
5. Cryptography and Security, C K Shyamala, N Harini, T R Padmanabhan, Wiley-India
6. Information Systems Security, Godbole, Wiley-India
7. Information Security Principles and Practice, Deven Shah, Wiley-India
8. Security in Computing by Pfleeger and Pfleeger, PHI
9. Build Your Own Security Lab : A Field Guide for network testing, Michael Gregg, Wiley
India
https://www.wireshark.org/
Page 3 of 6
w.e.f. AY 2018-19
GUJARAT TECHNOLOGICAL UNIVERSITY
Bachelor of Engineering
Subject Code:
List of Practical:
1. Implement RSA algorithm.
n=pxq
Initially take encryption key such that it is relatively prime with ф(n).
Test case :
Encryption key = 7
Decryption key = 23
M=88
C=11
2. Implement playfair cipher. The plaintext is paired in two characters. Discuss the advantage of
polyalphabetic cipher over monoalphabetic cipher.
Key = MONARCHY
Plaintext = ar mu hs ea
Ciphertext = RM CM BP IM
3. Implement Ceasar and Hill cipher. Both are substitution cipher. Analyze the strength of the cipher in
terms of brute force attack and cryptanalysis attack. Suggest one way to improve and strengthen the cipher
and analyze with respect to cryptanalysis attack.
Ceasar cipher -
You are given plaintext Hello, Welcome. The key used is 3. How Ceaser cipher will work?
Test case :
Page 4 of 6
w.e.f. AY 2018-19
GUJARAT TECHNOLOGICAL UNIVERSITY
Bachelor of Engineering
Subject Code:
ABC
DEF
Hill Cipher -
17 17 5
Key K = 21 18 21
2 2 19
Plaintext = pay
Ciphertext = RRL
GCD(16,12) = 4
GCD(12,4) = 0
6. Generate random number of 32 bits. Use different random number generation algorithms. Which method
gives the best ?
1. Uniformity
2. Scalabilty
3. Consistency
Page 5 of 6
w.e.f. AY 2018-19
GUJARAT TECHNOLOGICAL UNIVERSITY
Bachelor of Engineering
Subject Code:
7. (n)
Implement Euler’s totient function .It is defined as the number of positive integers less than n and
relatively prime to n.
(35) (37)
Find and . Observe the value and analyze the behavior of totient function.
10. Implement rail Fence and transposition cipher. Both are permutation cipher. Analyze the strength of the
cipher in terms of cryptanalysis.
Rail fence.
Ciphertext : MEMETE
Transposition
Key : 4312567
Plaintext: attackpostponeduntiltwoam
Ciphertext: TTNAAPTMTSUOAODWCOIXKNLYPETZ
11. Read traffic going on network. Analyze the traffic. Connect to internet and Read what is going on
internet.
Page 6 of 6
w.e.f. AY 2018-19