Sunteți pe pagina 1din 4

RIPHAH INTERNATIONAL UNIVERSITY FAISALABAD

DEPARTMENT OF COMPUTER SCIENCE AND SOFTWARE ENGINEERING


(Network Securt!"
I#$tructor N%&e Muhammad Usama
Roo& Nu&'er TBA
E&%( musama@riphahfsd.edu.pk
O))ce Hour$ TBA
Cour$e Det%($
Cre*t Hour$ 3
Lecture($" 3
Tutor%( TBA
Cour$e De$cr+to#
Gr%*#, Bre%ku+ %#* Po(c!
A$$,#&e#t$ - 10%
.u/ - 10%
Pro0ect - 10%
M* Ter& - 20%
F#%( Ter& - 50%
E1+ecte* Outco&e
1. To master the terminolog and !on!epts of "asi! !rptograph.
2. To master the !on!epts of !ipher design and implementation in en!rption and de!rption.
3. To "e!ome familiar #ith net#ork se!urit appli!ations.
$. To "e familiar #ith !ontemporar issues in net#ork se!urit
5. To "e familiar #ith A%&' (&A' &)A.
COURSE SCHEDULE
The purpose of this !ourse is to introdu!e fundamental prin!iples and !on!epts of net#ork se!urit. *e
#ill use a top+do#n to stud the net#ork se!urit algorithms. *e #ill first stud popular !rptographi!
appli!ations su!h as &mmetri! ,iphers' en!rption and de!rption and then stud different algorithms
to support these phenomenon-s appli!ations' and finall stud ho# these algorithms' te!hni.ues and
ser/i!es are implemented.
Week Topics Lectures
1,2 Introduction (1.5 weeks)
Road map of the course, Security trends, OSI security
architecture, Security attacks, security services, security
management and a model of network security
Redin!: Sections 1.1 1.!
1"#"$
2,",# C%ssic% encr&ption tec'ni(ues nd DES (# weeks)
Symmetric cipher model, Su$stitution techni%ue, &ransposition
techni%ues, data encryption standards '()S*, +lock cipher design
principles
Redin!: Sections 2.1 , ".-
)"5"*"+
#,.,/ ,d-nced Encr&ption stndrd (,ES) nd s&..etric
encr&ption (# weeks)
)valuation criterion for 0)S, 0)S cipher, 1lacement of encryption
function, &raffic 2onfidentiality, 3ey distri$ution, random num$ers.
Redin!: Sections ..1 , .." and -.1 -.#
/"0"11"11
/,-
RS, nd 2e& .n!e.ent (1 week)
RS0 algorithm, (iffie hellman key management
Redin!3 Section 4.14.2 and chapter 15
1#"1$"1)
!
4IDTER4 (1.5 Week)
!,4
4ess!e ut'entiction nd H,SH nd 4,C %!orit'.s(#
weeks)
0uthentication principles and 60S6 702 algorithms
Redin!: Section 11.1 , 12./
15"1*"1+"1
/
15,11
Di!it% si!ntures nd ut'entiction protoco%s (1.5 weeks)
(igital signatures, authentication protocols, (igital signature
standards
Redin!: Section 1".1 , 1"."
10"#1"#1
11,12
,ut'entiction ,pp%iction (1.5 weeks)
3er$eros, 8..54 0uthentication Service, 1u$lic key infrastructure
Redin!3 Section 1#.1 , 1#." and appendi9 1#0
##"#$"#)
1",1# E54i% Securit& (1.5 week)
1retty good privacy, S:7I7)
Redin!3 Sections 1..1 1..#
#5"#*"#+
1#,1.
I6 nd We7 Securit& (1.5 week)
0uthentication headers, )ncapsulating security payload, secure
socket layer and transport layer security, ;irewalls
Redin!3 2hapter 1/ 1-
#/"#0"$1
Su,,e$te* Book$
1. ,rptograph and net#ork se!urit " *illiam &tallings $th %dition.
2. 0undamentals of net#ork se!urit " 1. ,ana/an

S-ar putea să vă placă și