Sunteți pe pagina 1din 5

ANAND INSTITUTE OF HIGHER TECHNOLOGY

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


Academic Year: 2019-2020 (Odd Semester)
Regulation -2013

LECTURE PLAN

Semester, Degree & Branch: VII Semester B.E. CSE

Course Code & Title: CS6701 & CRYPTOGRAPHY AND NETWORK SECURITY

Name of the Faculty member: K.AMSAVALLI

Designation & Department: Assistant Professor- II & CSE

Course Objectives:

 Understand OSI security architecture and classical encryption techniques.

 Acquire fundamental knowledge on the concepts of finite fields and number theory.

 Understand various block cipher and stream cipher models.

 Describe the principles of public key cryptosystems, hash functions and digital signature.

Course Outcomes:
After completion of the course, it is expected that:

 Understand the fundamentals of networks security, security architecture, threats and vulnerabilities
 Apply the different cryptographic operations of symmetric cryptographic algorithms
 Apply the different cryptographic operations of public key cryptography
 Apply the various Authentication schemes to simulate different applications.
 Understand various Security practices and System security standards
Assessment Methods followed:

1. Internal Tests (Monthly Tests) are conducted to assess continuous learning.


2. Assignment are given to encourage students’ self-learning.
3. Mini Projects are given to improve the experiential learning.
4. End Semester Examination is conducted to assess overall learning by students.

Page 1 of 3
Teaching
Methodology
(Lecture
Lectu Role play
Date Topic(s) to be taught Teaching aids
re No. Group Discussion
Quiz
Debates
Gamefication)
UNIT I- INTRODUCTION & NUMBER THEORY

1. Introduction & Number theory Board Lecture


2. Services, Mechanisms and attacks Board Lecture
3. the OSI security architecture LCD Lecture
4. Network security model Board Group Discussion
5. Classical Encryption techniques Board Lecture
6. Symmetric cipher model Board Lecture
7. substitution techniques Board Role Play
8. transposition techniques Board Quiz
9. Steganography Board Lecture
10. finite fields and number theory Board Lecture
11. Groups, Rings, Fields Board Lecture
12. Modular arithmetic Board Group Discussion
13. Euclid’s algorithm-Finite fields Board Lecture
14. Polynomial Arithmetic –Prime numbers Board Lecture
Fermat’s and Euler’s theorem- Testing for Board Role Play
15.
primality
The Chinese remainder theorem- Discrete Board Quiz
16.
logarithms
UNIT II- BLOCK CIPHERS & PUBLIC KEY CRYPTOGRAPHY

17. Data Encryption Standard LCD Role Play


Block cipher principles-block cipher modes LCD Lecture
18.
of operation
19. Advanced Encryption Standard (AES) Board Lecture
20. Triple DES-Blowfish Board Group Discussion
21. RC5 algorithm Board Lecture
Public key cryptography: Principles of Board Lecture
22.
public key cryptosystems
Page 2 of 3
23. The RSA algorithm-Key management Board Role Play
24. Diffie Hellman Key exchange Board Quiz
25. Elliptic curve arithmetic Board Quiz
26. Elliptic curve cryptography Board Quiz
UNIT III- HASH FUNCTIONS AND DIGITAL SIGNATURES

Authentication requirement and LCD Lecture


27.
Authentication function
28. MAC Board Lecture
Hash function, Security of hash function Board Quiz
29.
and MAC
30. MD5, SHA Board Lecture
31. HMAC and CMAC Board Lecture
Digital signature and authentication Board Group Discussion
32.
protocols
33. DSS Board Lecture
34. EI Gamal , Schnorr Board Lecture
UNIT IV- SECURITY PRACTICE & SYSTEM SECURITY

35. Authentication applications , Kerberos Board Quiz


36. X.509 Authentication services LCD Lecture
37. Firewall related terminology Board Lecture
38. Types of Firewalls, Firewall designs LCD Lecture
39. SET for E-Commerce Transactions Board Group Discussion
Intruder , Intrusion detection system , Virus Board Lecture
40.
and related threats
Countermeasures, Firewalls design LCD Lecture
41.
principles
Trusted systems, Practical implementation Board Role Play
42.
of cryptography and security.
UNIT V- E-MAIL, IP & WEB SECURITY
E-mail Security: Security Services for E- LCD Lecture
43.
mail-attacks possible through E-mail
Establishing keys privacy, Authentication of Board Lecture
44.
the source
45. Message Integrity-Non-repudiation LCD Group Discussion
46. Pretty Good Privacy-S/MIME. Board Lecture
IPSecurity: Overview of IPSec – IP and Board Lecture
47.
IPv6
Authentication Header-Encapsulation LCD Role Play
48.
Security Payload (ESP)
Internet Key Exchange (Phases of IKE, LCD Quiz
49.
SAKMP/IKE Encoding).
Web Security: SSL/TLS Basic Protocol- LCD Lecture
50.
computing the keys
client authentication-PKI as deployed by LCD Lecture
51.
SSLAttacks fixed in v3

Page 3 of 3
Exportability-Encoding-Secure Electronic LCD Role Play
52.
Transaction (SET)
Content Beyond the Syllabus
LCD Lecturer
53.
Combining Security Associations
Mini Projects
Pure Transposition Cipher LCD Experiential
54.
Learning

TEXT BOOKS:

1. William Stallings, Cryptography and Network Security, 6th Edition, Pearson


Education, March 2013. (UNIT I,II,III,IV).
2. Charlie Kaufman, Radia Perlman and Mike Speciner, “Network Security”, Prentice Hall of
India,2002. (UNIT V).

REFERENCES:
1. Behrouz A. Ferouzan, “Cryptography & Network Security”, Tata Mc Graw Hill, 2007.
2. Man Young Rhee, “Internet Security: Cryptographic Principles”, “Algorithms and Protocols”,
Wiley Publications, 2003.
3. Charles Pfleeger, “Security in Computing”, 4th Edition, Prentice Hall of India, 2006.
4. Ulysess Black, “Internet Security Protocols”, Pearson Education Asia, 2000.
5. Charlie Kaufman and Radia Perlman, Mike Speciner, “Network Security, Second Edition,
Private Communication in Public World”, PHI 2002.
6. Bruce Schneier and Neils Ferguson, “Practical Cryptography”, First Edition, Wiley Dreamtech
India Pvt Ltd, 2003.
7. Douglas R Simson “Cryptography – Theory and practice”, First Edition, CRC Press, 1995.
8. http://nptel.ac.in/.

ASSIGNMENTS

Assignment -I

1. Discuss any four Substitution Technique and list their merits and demerits.
2. Draw the general structure of DES and explain the encryption decryption process. Mention the
strengths and weakness of DES algorithm.

Page 4 of 3
Assignment-II

1. Write and explain the digital signature algorithm and standards.


2. Explain the architecture of IP Security.

Prepared by: Approved by:


K.Amsavalli AP/CSE Dr.S.Roselin Mary
(Name & Signature of Faculty member) (Name & Signature of HOD)

Page 5 of 3

S-ar putea să vă placă și