You are on page 1of 27

1

Veer Narmad South Gujarat University Surat


Master of Science (Information Technology)
[Five Year Integrated Course]

Semester :7 Syllabus (Revised) Effective from June 2011

2 Effective from June 2011

VEER NARMAD SOUTH GUJARAT UNIVERSITY, SURAT M.Sc. (I.T.) [Five Year Integrated Course] M.Sc. (Information Technology) Semester VII Teaching and Evaluation Scheme
Teaching Schedule (Hours/Week) Lect Prac

Paper Sr. No.

Paper Title

University Exam Theory / Practical Duration | Hrs. | Marks

Internal Exam Theory / Practical Duration | Hrs. | Marks

Total Theory / Practical

Credit

701 702 703 704 705 706

C# .NET Advanced .NET Software Engineering Optimization Techniques Seminar Project


Total

4 4 4 4

3 3 3 3

70 70 70 70 70

2 2 2 2

30 30 30 30 30

100 100 100 100 100 200 700

4 4 4 4 4 10 30

30

10

140 490

60 210

3 Effective from June 2011

VEER NARMAD SOUTH GUJARAT UNIVERSITY, SURAT M.Sc. (Information Technology) Semester VII Paper No Paper Title : 701 : C# .NET L: 4 Hrs

1. NET Architecture. 2. C# Language 2.1. Introduction to C# 2.2. Data Types 2.3. C# Predefined Types 2.4. Complex Types 2.5. Variables 2.6. Constants 2.7. Operators 2.8. Flow Control 2.9. Program Structure 3. Object Oriented C# 3.1. Method Overloading 3.2. Construction & Disposal 3.3. Operator Overloading 3.4. Indexers 3.5. Interfaces 3.6. Collections 4. Exception & Error Handling 5. Generics 5.1. Generic Types 5.2. Generic Methods 5.3. Constraints 5.4. Casting 5.5. Inheritance 5.6. Static Members 6. Delegates 6.1. Define a Delegate 6.2. Create a Delegate 6.3. Invoking a Delegate 6.4. Array of Delegates 6.5. Asynchronous Invocation 6.6. Multicast Delegates 7. Events 7.1. Publishing an Event 7.2. Subscribe 7.3. Raising an Event

8. C# Pre-processor Directives 9. Assemblies, Threads, and AppDomains 10. Reflection 10.1. Obtaining a Type Object 10.2. Loading Assemblies 10.3. Browsing Type Information 10.4. Dynamic Invocation 10.5. Type Creation 10.6. Late Binding Delegates 11 Serialization 11.1. Configuring Objects for Serialization 11.2. Choosing a Serialization Formatter 11.3. Serializing Objects Using the BinaryFormatter 11.4. Serializing Objects Using the SoapFormatter 11.5. Serializing Objects Using the XmlSerializer 11.6. Serializing Collections of Objects 11.7. Customizing the Serialization Process 12 Attributes 12.1. Intrinsic Attributes 12.2. Custom Attributes 13 LINQ 13.1. Language features introduced by LINQ 13.2. Anonymous Types 13.3. Object Initializers 13.4. Implicitly Typed Local Variables 13.5. Extension method 13.6. Lambda Expressions 13.7. Query Expressions 13.8. LINQ to Objects 13.9. LINQ to XML 13.10. LINQ Data Access 13.11. LINQ to SQL 13.12. LINQ to Entities 13.13. Incorporating validation & business logic 14 Introduction to F#.Net Main Readings : 1. C# and the .NET Platform; Andrew Troelsen; APress 2. Professional C#; Simon Robinson; Wrox 3. Professional C# 2008; Christian Nagel; Wrox 4. Professional LINQ: Language Integrated Query in C# 2008; Jr. Joseph C. Rattz; Apress 5. Foundations of F#; Robert Pickering; Apress Supplementary Readings : 1. C# The Basics; Vijay Mukhi; BPB 2. C# Essentials; Ben Albabari; OReilly

3. 4. 5. 6.

C# The Nuts & Bolts; Akash Sarat & Sonal Mukhi; BPB C# 3.0 Unleashed: With the .NET Framework 3.5; Joseph Mayo; Sams Pro C# 2010 and the .NET 4 Platform; 5th Edition; Troelsen; Apress Programming F#; Chris Smith; O'Reilly

6 Effective from June 2011

VEER NARMAD SOUTH GUJARAT UNIVERSITY, SURAT M.Sc. (Information Technology) Semester VII Paper No Paper Title : 702 : Advanced .NET L: 4 Hrs

1. Web Architecture 1.1. Introduction to web Architecture 1.2. Client-Side Processing 1.3. ASP.NET Tie-up with Web Architecture 2. Overview of ASP.NET Framework 2.1. ASP.NET and the .NET Framework

2.2. 2.3. 2.4. 2.5. 2.6. 2.7. 2.8.

Common Language Runtime .Net Framework Class Library Namespaces Structure of ASP.NET Page Directives Code Declaration Blocks Code Render Block

3. Membership and Role Management in ASP .NET 3.1. Authorization 3.2. Web Site Administrative Tools 3.3. Public Methods of the Membership API 3.4. Public Methods of the Roles API 4. Localization 4.1. Globalization and Localization 4.2. Globalizing an ASP.NET Website 4.3. Culture and Locale 4.4. Switching Locale 4.5. Resource Files 4.6. Global Versus Local Resources 4.7. Creating Global Resources and Local Resources 4.8. Satellite Assemblies 4.9. Implicit Versus Explicit Localization 4.10. Incorporating Globalization 4.11. Setting the Culture of the Thread Based on User Selection 5. Web Services 5.1. Overview of Web Services 5.2. WebMethod Attribute 5.3. WebServices Attribute 5.4. XML Web Service 5.5. Invoking an XML Web Service with HTTP-Get 5.6. Invoking an XML Web Service with HTTP-Post 5.7. Invoking an XML Web Services with SOAP 5.8. Using the WebService Behavior 5.9. Using WebService Behavior Callback Functions

6.

AJAX(Asynchronous JavaScript and XML) 6.1. 6.2. 6.3. 6.4. Server Side Ajax Client Side Ajax Ajax Toolkit Setting up and implementing Ajax

7.

Model View Controller 7.1. Page Controller Pattern in ASP.NET 7.2. Problems with Page Controller Design 7.3. MVC Design: Front Controller Design 7.4. MVC and REST: Representation State Transfer 7.5. ASP.NET MVC Framework 7.6. URL Routing Engine 7.7. Wiring Controller, Model, and View 7.8. Unit Testing and ASP.NET MVC Windows Communication Foundation 8.1. The Role of WCF 8.2. WCF Assemblies 8.3. Composition of a WCF Application 8.4. WCF Client Application 8.5. Hosting the WCF Service 8.6. Invoking a Service Asynchronously 8.7. Designing WCF Data Contracts Windows Workflow Foundation 9.1. Defining Business Process 9.2. Building Blocks of Workflow Foundation 9.3. Workflow Foundation Assemblies and Namespaces 9.4. Invoking Web Services within Workflows 9.5. Reusable Workflow Foundation Code Library

8.

9.

10. Windows Presentation Foundation and XAML 10.1. Introduction to WPF and XAML 10.2. Types of WPF Applications 10.3. WPF Assemblies 10.4. XAML-Free WPF Application 10.5. XAML-Centric WPF Application 10.6. Transforming Markup into a .NET Assembly 10.7. Programming with WPF Controls Main Readings: 1. ASP.NET 4 Unleashed; Stephen Walther, Kevin Hoffman, Nate Dudek; Sams 2. Beginning ASP.NET 3.5: In C# and VB (Programmer to Programmer); Imar Spaanjaars; Wrox 3. Professional ASP.NET 3.5: In C# and VB; Bill Evjen, Scott Haselman, Devin Reader; Sams 4. ASP.NET MVC Framework Unleashed; Stephen Walther; Wrox

5. Essential Windows Communication Foundation (WCF): For .NET Framework 3.5; Steve Resnick; Pearson 6. Windows Presentation Foundation Unleashed (WPF); Adam Nathan; Sams Supplementary Reading: 1. 2. 3. 4. 5. Programming Microsoft ASP.NET 3.5; Dino Esposito; Microsoft Press C# 3.0 in a Nutshell: A Desktop Quick Reference; Joseph Albahari; O'Reilly Microsoft Visual Studio 2008 Unleashed; Lars Powers; Sams Pro ASP.NET 3.5 in C# 2008: Third Edition (Paperback); Matthew MacDonald; Apress Beginning ASP.NET 3.5 in C# 2008: From Novice to Professional; Matthew MacDonald; Apress. 6. Programming ASP.NET AJAX; Christian Wenz; OReilly.

9 Effective from June 2011

VEER NARMAD SOUTH GUJARAT UNIVERSITY, SURAT M.Sc. (Information Technology) Semester VII Paper No Paper Title : 703 : Software Engineering L: 4 Hrs

1. Software Matrix & Project Planning 1.1. Software Measurements 1.2. Metrics for Software Quality 1.3. Project Planning Objectives 1.4. Software Scope 1.5. Resources 1.6. Decomposition Techniques 1.7. Empirical Estimation Model 1.8. Make-Buy Decision 2. Risk Management 2.1. Software Risk 2.2. Risk Identification 2.3. Projection 2.4. Migration 2.5. Monitoring 2.6. Management 3. Project Scheduling & Tracking 3.1. Relationship between People & Effort 3.2. Defining a Task set for the Software Project 3.3. Selecting & Refining Software Engineering Tasks 3.4. Scheduling 4. Software Configuration Management 4.1. Baselines 4.2. SCM Process 4.3. Change Control 4.4. Version Control 4.5. Configuration Audit 4.6. Status Reporting 4.7. SCM Standards 5. Formal Verification 5.1. Formal Methods 5.2. Theorem Proving 5.3. Model Checking 5.4. Equivalence Partitioning 6. Object Oriented Concepts & Principles 6.1. Object Oriented Paradigm & Concepts 6.2. Identifying the elements of an Object Model 6.3. Management of Object Oriented Software Projects

10

7. Object Oriented Analysis & Design 7.1. Domain Analysis 7.2. Generic Components of the OO Analysis & OOA Process 7.3. Object Relationship Model 7.4. Object Behavior Model 7.5. Generic Components of the OO Design & System Design Process 7.6. Object Design Process & Design Pattern. 8. Web Engineering 8.1. Attributes of web based application 8.2. Framework of Web engineering 8.3. Analyzing Web-Based system 8.4. Design of Web-Based Application 8.5. Testing of Web Application 8.6. Management Issues 9. Project Management Tools Case studies may be carried out at appropriate stages of the course. Main Readings : 1. Software Engineering A practitioners approach; Roger S Pressman; McGraw Hill 2. Object Oriented Modeling Design; James Rumbaugh, Michael Blaha; PHI 3. An Integrated Approach to Software Engineering; Pankaj Jalote; Narosa Pub. Supplementary Readings : 1. Software Engineering Concepts; Fairley R E; Mc-Graw Hill 2. Software Engineering; Lewis T G; Mc-Graw Hill 3. Fundamentals of Software Engineering; Carlo Ghezzi 4. IEEE standard for software user documentation; STD 1063-1987 5. Software Engineering- A programming approach; D. Bell, I. Morrey; PHI

11

12 Effective from June 2011

VEER NARMAD SOUTH GUJARAT UNIVERSITY, SURAT M.Sc. (Information Technology) Semester VII Paper No Paper Title : 704 : Optimization Techniques L: 4 Hrs

1. Job Sequencing 1.1. Processing n jobs through 2 machines 1.2. Processing n jobs through 3 machines 1.3. Processing 2 jobs through m machines 1.4. Processing n jobs through m machines 2. Network Analysis 2.1. Project Evaluation and Review Technique (PERT) 2.2. Critical Path Method (CPM) 3. Queuing theory 3.1. Essential features of queuing system 3.2. Performance measurement of queuing system 3.3. Classification of queuing model 3.4. Single server queuing model 3.5. Multi-server queuing model 4. Simulation 4.1. Simulation Introduction 4.2. Types of simulation 4.3. Steps of simulation process 4.4. Advantages and disadvantages of simulation process 4.5. Stochastic simulation and random numbers 5. Dynamic programming 5.1. Dynamic programming 5.2. Developing optimum decision policy 5.3. Dynamic programming under certainty 5.4. Shortest route problem 5.5. Multiple separable Return function and single additive constraints 5.6. Additive separable Return function and single additive constraints 5.7. Additive separable Return function and single multiplicative constraints Main Readings : 1. Operations Research; S.D. Sharma; Kedar Nath, Ram Nath & Co. 2. Operations Research; Kantiswarup, P.K.Gupta and Manmohan: Sultan Chand and Sons. Supplementary Readings : 1. Introduction to Operation Research Computer Oriented algorithm; B.E. Gillet 2. Operation research an Introduction; H.A. Taha 3. Optimization for Engineering Design, Algorithms and Examples Prentice; Kalyanmoy Deb; Hall of New Delhi, India, 2000 4. PERT and CPM : Principles and Applications; 2nd edition, 1975; Srinath L.S.

13 Effective from June 2011

VEER NARMAD SOUTH GUJARAT UNIVERSITY, SURAT M.Sc. (Information Technology) Semester VII Paper No Paper Title : 705 : Seminar P: 4 Hrs

Students do and present seminar work during the semester.

14 Effective from June 2011

VEER NARMAD SOUTH GUJARAT UNIVERSITY, SURAT M.Sc. (Information Technology) Semester VII Paper No Paper Title : 706 : Project P: 14 Hrs

Students carry out project work for part time during the semester based upon the theory subjects.

15

Veer Narmad South Gujarat University Surat


Master of Science (Information Technology)
[Five Year Integrated Course]

Semester :8 Syllabus (Revised) Effective from June 2011

16 Effective from June 2011

VEER NARMAD SOUTH GUJARAT UNIVERSITY, SURAT M.Sc. (I.T.) [Five Year Integrated Course] M.Sc. (Information Technology) Semester VIII Teaching and Evaluation Scheme
Teaching Schedule (Hours/Week) Lect Prac

Paper Sr. No.

Paper Title

University Exam Theory / Practical Duration | Hrs. | Marks

Internal Exam Theory / Practical Duration | Hrs. | Marks

Total Theory / Practical

Credit

801 802 803 804 805 806

Java Web Development Enterprise Java MIS Information Security and Applications Seminar Project
Total

4 4 4 4

3 3 3 3

70 70 70 70 70

2 2 2 2

30 30 30 30 30

100 100 100 100 100 200 700

4 4 4 4 4 10 30

30

10

140 490

60 210

MIS

Management Information System

17 Effective from June 2011

VEER NARMAD SOUTH GUJARAT UNIVERSITY, SURAT M.Sc. (Information Technology) Semester VIII Paper No Paper Title : 801 : Java Web Development L: 4 Hrs

1. Java Web Architecture 1.1. The Java Advantage for Web, 1.2. Java Editions, JAVA Enterprise Edition 1.3. Java EE Web Architecture, 1.4. Java Web Application Servers, 1.5. Installing and Configuring 1.6. Glassfish Application Server, 1.7. Java EE APIs for Building web Applications, 1.8. IDEs for Enterprise Application Development 2. Java Database Programming 2.1. The 2-Tier Client Server Architecture, 2.2. Java Dabase Connectivity (JDBC) API for Accessing Databases, 2.3. Database Drivers, Loading a Driver Class, 2.4. Connecting the Database Server, 2.5. Making the Query with Statement Object, 2.6. Getting the data - The ResultSet Object 2.7. Writing the First Database Application, 2.8. More about ResultSet, Making the Faster Execution with PreparedStatement Object, 2.9. Data about Data - The ResultSetMetaData Object 2.10. Java-SQL Data Types, Manipulating the Data with JDBC- Insert, Update and Delete 2.11. Batching the Operations , 2.12. Calling Stored Procedures and Functions The CallableStatement Object, 2.13. Handling Database Transactions, A Sample Database Application 3. Java Servlets 3.1. Introduction to Java Servlets 3.2. The Java Servlet API, Writing Your First Servlet, 3.3. Deploying the Java Web Application , 3.4. The Servlet Life Cycle, CGI and Servlets, 3.5. Request and Response 3.6. Getting Values from Forms and QueryStrings, 3.7. Working with Databases, Working with HTTP Headers , 3.8. Remembring the State with Cookies, 3.9. Using Hidden Fields, 3.10. Session Tracking and Management , 3.11. ServletContext and ServletConfig, 3.12. Initalisation Parameters, Inter-Servlet Communication with Request 3.13. Dispaching and Forwarding, Filters, Web Listeners, 3.14. Writing Deployment Descriptor, A Sample Servlet Project, 3.15. Packaging the Application with ANT 3.16. Deploying and Running the Project

18

4. Java Server Pages 4.1. Introduction to Java Servlets 4.2. Overview of Java Server Pages (JSP) , 4.3. How JSP Works, JSP Page Directives, 4.4. The Declaration Element, The Scripting Elements , 4.5. Writing your First JSP, The Action tags 4.6. The Implicit Objects, Handling the HTML Form Submission, 4.7. The Assignmet Tag, The Form Validation with Java Bean, 4.8. Working with Java Beans, Working with Plugins , 4.9. Working with application , 4.10. session and page , A Complete JSP Application 5. JSTL And EL 5.1. Introduction to Java Standard Tag Library, 5.2. Using JSTL in JSP, Response with JSTL, 5.3. EL The Expression language, 5.4. Variable Assignment with set Tag, 5.5. Handling Request and Response with JSTL/EL, 5.6. The Logic and The Iteration with JSTL, 5.7. Working with Property Files, 5.8. Internationalisation and Localisation with fmt Tag, 5.9. Managing Session and Application Attributes, 5.10. Working with Databases, Working with XML, 5.11. A JSTL/EL Application 6. The Java Web Application Frameworks 6.1. STRUTS, 6.2. SPRING and 6.3. Java Server Faces Main Readings : 1. Head First Servlets and JSP; Bryan Basham, Kathy Sierra, Bert Bates; 'Reilly Media; ISBN 10: 0-596-00540-7 | ISBN 10: 0-596-55633-0 2. Core Servlets and Javaserver Pages; Marty Hall, Larry Brown, Sun Micro System Supplementary Readings : 1. Java Servlet & JSP Cookbook; Bruce W. Perry; Oreilly 2. Beginning JSP, JSF and Tomcat Web Development: From Novice to Professional; Giulio Zambon and Michael Sekler.

19 Effective from June 2011

VEER NARMAD SOUTH GUJARAT UNIVERSITY, SURAT M.Sc. (Information Technology) Semester VIII Paper No Paper Title : 802 : Enterprise Java L: 4 Hrs

1. Introduction to Java EE 1.1. Tiered model architectures principles and goals 1.2. Java EE definition and characteristics 1.3. Java EE technologies in a multi-tier architecture 2. Java Naming And Directory Interfaces 2.1. Locating objects using JNDI 2.2. Definition and structure of JNDI 2.3. Naming and Directory Services 2.4. Context, initial context and JNDI tree 3. Enterprise Java Beans 3.1. Stateless Session Bean 3.2. Statefull Session Bean 3.3. Binding and looking up objects 3.4. Singleton Beans 3.5. Local and Remote Lookups 3.6. Timers and Schedulers 3.7. Asynchronous EJB Methods 4. Java Messing Services 4.1. JMS Architecture 4.2. Queue And Topic Messages, 4.3. Message Driven Beans, JMS Producer and Consumers , 4.4. Creating Web Client for MDB 5. Java Persistence 5.1. Persist objects in Java EE using JPA 5.2. JPA overview 5.3. JPA architecture 5.4. ORM 5.5. Entity 5.6. PA Annotations 5.7. One to One 5.8. One to Many 5.9. Many to Many Relationships 5.10. JPA Query Language 5.11. Named Queries 5.12. Dynamic Queries AND Native Queries 5.13. Transactions 6. Web Services 6.1. Introduction, SOAP Basics 6.2. UDDI

20

6.3. 6.4. 6.5. 6.6. 6.7. 6.8.

WSDL and Schema, Creating and Publishing a Web Service, Searching and Consuming a Web Service, Creating web services for EJBs and Consuming them, Securing Web Service Communication Introduction to REST services

7. Web Application Security 7.1. The Need of Security 7.2. Security Threats,Realm 7.3. Users, Group and Roles 7.4. Basic Authentication 7.5. Techniques 7.6. Form Based Authenication 7.7. Protecting Your Resources 7.8. Java API for Authentcation and Security JAAS 7.9. Maintaining Confidentiality with JAAS 7.10. Generating Certificates 7.11. Signing Your Certificate 7.12. SSL and Certificate Based Authentications 7.13. Providing Security to Your Sample Web Application Main Readings : 1. Mastering Enterprise JavaBeans and the Java 2 Platform, Enterprise Edition; Ed Roman 2. Java 6 EE Tutorial Basic Concepts; Sun Micro Syatem 3. Beginning Java EE 6 Platform with GlassFish 3: From Novice to Professional; Antonio Goncalves Supplementary Readings : 1. Beginning EJB 3 Application Development From Novice to Professional; Raghu R. Kodali and Jonathan Wetherbee with Peter Zadrozny; Apress 2. Pro JPA 2: Mastering the Java Persistence API (Expert's Voice in Java Technology); Mike Keith and Merrick Schincariol; Apress

21 Effective from June 2011

VEER NARMAD SOUTH GUJARAT UNIVERSITY, SURAT M.Sc. (Information Technology) Semester VIII Paper No Paper Title : 803 : MIS L: 4 Hrs

1. Foundation of Information System 1.1. Introduction to Information System and MIS 1.2. Decision support and decision making systems, systems approach 1.3. The systems view of business 1.4. MIS organization within company 1.5. Management information and the systems approach. 2. Information Technology 2.1. A managers overview 2.2. Managerial overviews 2.3. Computer hardware & software , DBMS, RDBMS 2.4. Telecommunication. 3. Conceptual system design 3.1. Define the problems 3.2. Set systems objective 3.3. Establish system constraints 3.4. Determine information needs 3.5. Determine information sources 3.6. Develop alternative conceptual design 3.7. Prepare the conceptual design report. 4. Detailed system design 4.1. Inform and involve the organization, aim of detailed design 4.2. Project management of MIS detailed design 4.3. Identify dominant and trade of criteria 4.4. Define the sub systems 4.5. Sketch the detailed operating sub systems and Information flow 4.6. Determine the degree of automation of each operation, inform and involve the organization again, inputs outputs and processing 4.7. Early system testing, software, hardware and tools 4.8. Document the detailed design revisit the manager user. 5. Implementation evaluation and maintenance of the MIS 5.1. Plan the implementation 5.2. Acquire floor space and plan space layouts 5.3. Organize for implementation, develop procedures for implementation 5.4. Train the operating personnel 5.5. Computer related acquisitions 5.6. Develop forms for data collection and information dissemination

22

5.7. Develop the files test the system, cut-over, document the system 5.8. Evaluate the MIS control and maintain the system 5.9. Pitfalls in MIS development. 6 Advanced Concepts in Information Systems 1.1. Enterprise Resources Management(ERP) 1.2. Supply Chain Management 1.3. C R M 1.4. Procurement Management System. Main Readings: 1. Management Information System; W. S. Jawadekar; Tata McGraw Hill 2. Information System for Modern Management; 3rd Edition; Robert G. Murdick, Loel E. Ross & James R. Claggett; PHI 3. Management Information Systems; Kenneth J Laudon, Jane P. Laudon; Pearson. Supplementary Readings: 1. Management Information System; O Brian; TMH 2. Management Information System; Davis Olson; Mac Graw Hill 3. Management Information System; Stasllings; Maxwell Mc Millman Publishers 4. Information System: a Management Perspective; Alter Addison Wesley 5. Introduction to Information System; McGraw Hill

23 Effective from June 2011

VEER NARMAD SOUTH GUJARAT UNIVERSITY, SURAT M.Sc. (Information Technology) Semester VIII Paper No Paper Title : 804 : Information Security and Applications L: 4 Hrs

1. Introduction To Security Need for security Information, Network, Physical Security Principles of security Security Mechanisms, Attributes and Attacks Cryptography and the role of cryptography in data security 2. Classical Cryptography & Shannons Theory 2.1. The Shift Ciipher, Substitution & Transposition techniques 2.2. The Affine Cipher 2.3. The Vignere Cipher 2.4. The Hill Cipher 2.5. Introduction to Stream Ciphers 2.6. Perfect Secrecy 2.7. Theoretical Security & Computational Security 2.8. Motivation for Product Cryptosystems 3. Block ciphers 3.1. Introduction 3.2. Block Cipher Designs : The Substitution Permuatation Networks and Feistel Ciphers 3.3. Block ciphers versus stream ciphers 3.4. Data encryption standard (DES) 3.5. Attacks on DES 3.6. Differential and linear Cryptanalysis 3.7. Advanced encryption standard (AES) 3.8. Attacks on AES 3.9. Block cipher modes of operation 4. Mathematical Foundations for Public Key Cryptography Elementary Number Theory Modular Arithmetic Prime Numbers Fermat's and Euler's Theorems Testing for Primality The Chinese Remainder Theorem Discrete Logarithms The Euclidean Algorithm, The Extended Euclidean Algorithm 5. Public key cryptography 5.1. Introduction

24

5.2. 5.3. 5.4. 5.5.

Principles of public key cryptosystems The RSA algorithm Attacks on RSA The Rabin Cryptosystem

6. Key management 6.1. Key distribution scenarios 6.2. Key management 6.3. Diffie-Hellman key exchange 7. Message authentication and hash functions 7.1. Authentication requirements 7.2. Authentication functions 7.3. Message authentication codes 7.4. Hash functions 7.5. MD5 message digest algorithm 7.6. Secure Hash algorithm (SHA) 8. Digital signatures and authentication protocols 8.1. Digital signatures 8.2. Authentication protocols 8.3. Digital signature standard 9. User Authentication Protocols 9.1. Remote User Authentication Principles 9.2. Remote User Authentication Using Symmetric Encryption 9.3. Kerberos 9.4. Pretty good privacy 9.5. S/MIME 10. Transport-Level Security 10.1. Web Security Issues 10.2. Secure Sockets Layer (SSL) 10.3. Transport Layer Security (TLS) 10.4. HTTPS 10.5. Secure Shell (SSH) 11. Wireless Network Security IEEE 802.11 Wireless LAN Overview IEEE 802.11i Wireless LAN Security Wireless Application Protocol Overview Wireless Transport Layer Security WAP End-to-End Security 12. Electronic Mail Security 12.1. Pretty Good Privacy (PGP) 12.2. S/MIME 12.3. Domain Keys Identified Mail (DKIM) 13. IP Security & Miscellaneous Topics

25

13.1. IP Security Overview 13.2. IP Security Policy 13.3. Encapsulating Security Payload 13.4. Combining Security Associations 13.5. Internet Key Exchange 13.6. Cryptographic Suites 13.7. Firewalls 13.8. Biometrics Main references: 1. Cryptography and Network Security; B. Forouzan; McGraw-Hill. 2. William Stallings: Cryptography and Network Security; Principles and Practice; Prantice Hall. Supplementary References: 1. Information security: Theory and Practice; Dhiren R. Patel; PHI

26 Effective from June 2011

VEER NARMAD SOUTH GUJARAT UNIVERSITY, SURAT M.Sc. (Information Technology) Semester VIII Paper No Paper Title : 805 : Seminar P: 4 Hrs

Students do and present seminar work during the semester.

27

Effective from June 2011

VEER NARMAD SOUTH GUJARAT UNIVERSITY, SURAT M.Sc. (Information Technology) Semester VIII Paper No Paper Title : 806 : Project P: 14 Hrs

Students carry out project work for part time during the semester based upon the theory subjects.

You might also like