MNIT Jaipur Syllabus computer science Information System Security





MNIT Jaipur Syllabus computer science   Information System Security  





Information System Security  

Review of Number theory: Prime numbers, modular arithmetic, Fermat’s theorem, Euler’s theorem,

Chinese remainder theorem, Discrete logarithms, Random number, prime number, factoring, .

Cryptography: Classical, stream and block cipher, steganography. Public v/s private key cryptography.

Random Number Generation: Pseudo Random Number, PRNG, LFSR, Blum-Blum Shub generator

Private-key cryptography: Feistel structure, DES, design of S-boxes, AES, Triple DES.

Public key cryptography: Key management, Key exchange – Diffie-Hellman, El-Gamal, Merkle’s

Puzzle, Authentication, Signatures, Deniability, RSA.

Threshold Cryprography: Sharing Secrets.

Digital Signature: DSA and its variants, discrete logarithm based digital signatures.

One-way hash functions – MD5, SHA (Secure Hash Algorithm).

Cryptanalysis: Differential and linear cryptanalysis – cracking DES.

Text & References:

1. Stallings, Cryptography and Network Security: Principles and Practice, Pearson Education Asia.

ISBN 981-403-589-0.

2. B Schneier, Applied Cryptography, Wiley. ISBN 0-471-11709-9

3. D Kahn. The Codebreakers, Sphere books. ISBN 0-7221-51497

4. P Wayner, Disappearing Cryptography, Academic Press. ISBN 0-12-738671-8

5. Cracking DES, Electronic Frontier Foundation. ISBN 1-56592-520-3

6. A.J. Menezes, P.C. van Oorschot and S.A. Vanstone, Applied Cryptography, CRC Press, ISBN

0-8493-8523-7, 1997

7. D.R. Stinson, Cryptography – Theory and practice, CRC Press, ISBN 0-8493-8521-0, 1995

IT-323 E-Commerce and Web Applications  (3-0-0) 3

Electronic commerce environment and opportunities: Back ground – The Electronic commerce

Environment – Electronic Market Place Technologies. Modes of electronic commerce: Overview – EDI

– Migration to open EDI – E commerce with WWW/Internet – Commerce Net Advocacy – Web

commerce going forward. Approaches to safe electronic Commerce – Overview – Source – Transport

Protocols – Secure Transactions – Secure Electronic Payment Protocol – Secure Electronic Transaction –

Certificates for Authentication – Security on Web Servers and enterprise networks. Electronic cash and

electronic payment schemes – Internet Monitory Payment and Security requirements – payment and

purchase order process – online electronic cash. Master card/ Visa Secure electronic transaction:

Introduction – Business requirements – Concepts – Payment Processing. Email and Secure Email

Technologies for Electronic Commerce: Introduction – The means of Distribution – A model for

Message Handling – How Does a Email Work. Internet Resources for Commerce: Introduction –

Technologies for Web Servers – Internet Applications for commerce – Internet Charges – Internet Access

and Architecture – Searching the Internet.

Text/ References:

1. Web Commerce Technology Hand Book Daniel Minoli, Emma Minoli McGraw Hill

2. Frontiers of Electronic Commerce Ravi Kalakotar, Andrew B.Whinston Addison-WesleyIT-325 Computer Networks &  Administration  (4-0-0) 4

1. Computer network architecture, Physical layer: Hardware, topology, data encoding,

2. Data Link Layer: Logical link Control: Error detection and Correction, ARQ protocols, Framing

protocols( HDLC, LLC) Medium Access Control: Multiple access protocols, Channel

Allocation, contention, reservation, round robin with Examples.

3. Network Inter connection: Generic switches, switch design issues, switching mechanism : virtual

Circuit switching, datagram switching, source route switching, Bridge and bridge learning ,

Global Addressing scheme, fragmentation and reassembly,  Address translation: ARP, RARP,

ICMP, IP Scalability Issues, sub netting and super netting (CIDR) , IP Routing, EGP, BGP


4. End to End protocols: End to end issues, UDP and TCP segment formats, connection

establishment and termination, state transition sliding window protocol, TCP Flow control, Silly

window syndrome, TCP retransmission, RTT Estimation, TCP Congestion Control and

congestion avoidance protocols

5. Internet applications: Client server paradigm, DNS, SMTP, RPC, NFS and General network

security issues.

6. Introduction to Network management protocols. Tools and techniques for network monitoring

authentication, and administration.


1. Data Networks: Bertsekas and Gallagher, Phi.

2. Computer Networking A Top down Approach: J.F.Kurose, Pearson.

3. Computer Networks A Systems Approach: L. Peterson and B. Davie, Elsevier

4. Computer Networks and Internet: D.E. Comer, Pearson

Leave a Comment