Mathematical concepts: Random numbers, Number theory, finite fields
The use of the Internet for various purpose including social, business, communication and
other day to day activities has been in common place. The information exchanged through Internet plays
vital role for their owners and the security of such information/data is of prime importance. Knowing the
concepts, principles and mechanisms for providing security to the information/data is very important for
the students of Computer Engineering/Information technology. The subject covers various important
topics concern to information security like symmetric and asymmetric cryptography, hashing, message
and user authentication, digital signatures, key distribution and overview of the malware technologies.
The subject also covers the applications of all of these in real life applications.
After learning the course the students should be able to:
- Define the concepts of Information security and their use.
- Describe the principles of symmetric and asymmetric cryptography.
- Understand and apply the various symmetric key algorithms.
- Understand and apply the various asymmetric key algorithms.
- Understand the concepts of hashing with algorithms and apply them.
- Understand and use the message authentication and its requirement.
- Understand the concepts of digital signature and digital certificates.
- List and explain various digital signature algorithms.
- Understand and use the various key management and remote authentication mechanisms.
- Understand the concept transport layer security.