10EC832: NETWORK SECURITY
|
|
- Melina Newton
- 6 years ago
- Views:
Transcription
1 10EC832: NETWORK SECURITY Objective: In this electronic age, security and privacy are two of the issues whose importance cannot be stressed enough. How do we ensure the systems we use are resistant to electronic fraud? What are some of the safe computing/internet practices that we can follow to avoid attacks by hackers? How do we share private data over a public channel and be immune to eavesdropping or interceptions? How do we ensure information is sent to an authentic source and guard against repudiation? These are some of the many questions that a computer or information scientist and engineer ought to be aware of. From times immemorial, cryptography has captured the imagination of people. Though the discussions are largely qualitative and not mathematically involved, the course provides a broad overview of the challenges that face electronic storage and communication. Recognizing that it is as important in knowing what has been done to fortify against possible attacks over time, in the words of Dr. Bill Stallings (the author of the prescribed text), the course provides a survey of both the principles and practices of cryptography and network security.
2 06EC832: NETWORK SECURITY Faculty :Shivaraj Karki No # Of Hours: 52 Class# Chapter Title/ Reference Literature OVERVIEW Topics to be covered %of Portion Covered Reference Chapter Cumulative 1 UNIT-1 Services, Mechanisms and Attacks 2 The OSI Security architecture 3 A model for network security SYMMETRIC CIPHERS UNIT-2 4 Symmetric Cipher Model,Substitution Techniques 5 Transposition Techniques 6 Simplified DES 7 Data encryption standard (DES), The strength of DES UNIT-2 8 The strength of DES 9 Differential and Linear Cryptanalysis 10 Block Cipher Design Principles and Modes of Operation 11 Evaluation Criteria for Advanced Encryption Standard 12 The AES Cipher UNIT-3 PUBLIC KEY ENCRYPTION AND HASH FUNCTIONS 5.76% 5.76% 17.30% 17.30% 23.06% 15.38% 38.44% 13 Principles of Public-Key Cryptosystems 14 The RSA algorithm UNIT-3 15 Key Management 16 Diffie - Hellman Key Exchange 17 Elliptic Curve Arithmetic 18 Authentication functions 19 Authentication functions 20 Hash Functions WEB SECURITY 11.54% 50% UNIT-5 21 Web Security Consideration 22 UNIT-5 Web Security Consideration 23 Security socket layer (SSL) 24 Transport layer security 25 Secure Electronic Transaction 26 Secure Electronic Transaction INTRUDERS 11.54% 61.54% 27 Intruders 28 UNIT-6 Intruders 29 Intrusion Detection 30 Intrusion Detection 31 Password Management 32 Password Management MALICIOUS SOFTWARE 11.54% 73.08% UNIT-7 33 Viruses and Related Threats
3 34 Viruses and Related Threats 35 Viruses and Related Threats 36 Virus Countermeasures 37 Virus Countermeasures 38 Virus Countermeasures DIGITAL SIGNATURES AND AUTHENTICATION 13.46% 86.54% UNIT-4 PROTOCOLS 39 Digital signatures UNIT-4 40 Digital signatures 41 Authentication Protocols 42 Authentication Protocols 43 Authentication Protocols 44 Digital Signature Standard 45 Digital Signature Standard FIREWALLS 13.46% 100% UNIT-8 46 Firewalls Design Principles 47 Firewalls Design Principles 48 UNIT-8 Firewalls Design Principles 49 Trusted Systems 50 Trusted Systems 51 REVIEW-QUESTION PAPERS 52 REVIEW-QUESTION PAPERS LITERATURE: Book Type Code Title & Author Publication Info Edition Publisher Year Text Book T Cryptography and Network Security: Principles and Practices, William Stallings Third Edition Pearson Education 2003 Reference Book Reference Book R1 R2 SYLLABUS FOR INTERNALS Test # Syllabus T1 UNIT # 1,2,3 T2 UNIT # 5,6,7 T3 UNIT # 4,8 Cryptography and Network Security: Behrouz A Forouzon Atul Kahate, Cryptography and Network Security Second Edition First Edition Tata McGraw Hill Tata McGraw Hill
4 QUESTION BANK CRYPTOGRAPHY-I Content Conventional Encryption: A detailed examination of conventional encryption algorithms and design principles, including a discussion of the use of conventional encryption for confidentiality. Chapter 1: Serves as an introduction to the rest of the chapters. Chapter 2: It provides a gentle and interesting introduction to cryptography and cryptanalysis and highlights important concepts. Chapter 3: Introduces the principles of modern symmetric cryptography, with an emphasis on the most widely used encryption technique, the Data Encryption Standard (DES). Chapter 6: Extends the discussion to include some of the most important contemporary block cipher algorithms such as triple DES and Blowfish. Chapter 7: Discusses the end-to-end versus link encryption, techniques for achieving traffic confidentiality and key distribution techniques. Random number generation is also discussed. Sl No Questions Marks 1. Explain the classification of Security Services Define the term information security. With examples discuss about various security violations during transmission of information 3. Describe the different Security attacks with figure 6 4. Explain briefly the four types of security attacks that are normally encountered. Also distinguish between active and passive attacks 5. Explain the model for network Security 6 6. With a neat diagram explain each component of Model of Conventional 6 Crypto System. 7. Explain briefly the four types of security attacks that are normally 10 encountered. Also distinguish between active and passive attacks 8. Discuss Briefly about cryptanalysis 5 9. Explain Caesar cipher & mono alphabetic ciphers method of encryption Explain simplified DES method of encryption 11. Explain what is meant by diffusion & confusion Explain the classical Feistel cipher structure Explain the differential Cryptanalysis mechanism 6*
5 14. Bring out the difference between the following pairs of terms: i) Diffusion and confusion ii) Steganography and Cryptography iii) Known and chosen plaintext Cryptanalysis 15. Write a brief note on Steganography What is the need for public key cryptography? Explain its principle and how it can be adopted for 1) encryption and 2) authentication 17. Explain in brief the schemes public key authority and public key certificates proposed for the distribution of public keys 18. With suitable diagrams show how public key encryption can be used in confidentiality, authentication and both 19. With schematic diagrams explain the single round of DES encryption algorithm 20. Explain the principle of Diffie- Hellman key exchange with a suitable example 21. Briefly explain the classical encryption techniques Briefly describe the two basic building blocks of all encryption techniques Briefly explain the Simplified DES scheme Describe stream ciphers and block ciphers Explain the motivation for Feistel cipher structure Explain Feistel Decryption algorithm Describe briefly the DES encryption Describe briefly the DES decryption Explain Single Round DES algorithm Write a short note on Strength of DES Write a short note on Differential and linear cryptanalysis What is meant by triple DES How does it over come the problem encountered in Double DES 33. How does triple DES differ from double DES? Discuss about the known plain text attack on triple DES 34. Explain the design principles of IDEA. 35. With the structure of IDEA explain the algorithm of IDEA 6* 36. With a detailed diagram explain the method of encryption and decryption 10 using Blowfish Algorithm 37. Define what is link and End-to-End encryption with advantages and 6* disadvantages of each. 38. State the steps followed in Key Distribution Scenario. With Diagram 6* 39. Explain Blum Blum Shub generator Explain a typical key distribution scenario. What are the tradeoffs involved 14* in determining the life of a particular session key. 41. Write a short note on Potential Locations for confidentiality Attacks Briefly explain Traffic Confidentiality Describe the different sources of Random numbers 15
6 Cryptography II Content Public Key Encryption and Hash Functions: A detailed examination of public key encryption algorithms and design principles. This part also examines the use of message authentication codes as well as digital signatures and public-key certificates. Chapter 8: This chapter gives an introduction to number theory and discusses Fermat s and Euler s theorems as well as testing for primality. Chapter 9: This chapter introduces public-key encryption and how it can be used to provide confidentiality. The RSA algorithm is discussed in detail. Chapter 10: We study the public-key schemes that are based on number theory. Chapter 11: This chapter analyzes the requirements of authentication and provides a systematic presentation of approaches to authentication. Chapter 12: Extends the discussion through the message digest algorithm Chapter 13: Digital signature is an important type of authentication. Various authentication techniques based on digital signatures are building blocks in putting together authentication algorithms. SlNo. Questions Marks 1. What are the important characteristics of that public key Cryptosystems 10 follow. Explain the public key encryption process 2. Differentiate between public key and conventional encryption 6* techniques. 3. State the requirements of public key cryptography Describe the different applications for Public-Key Cryptosystems Write a short note on Public-Key Cryptanalysis Describe RSA algorithm. 7. Explain the Security of RSA Explain the different methods of Distribution of Public Keys. 9. Briefly explain the Public-Key Distribution of Secret Keys Explain DIFFIE-HELLMAN key exchange method. 11. Why is gcd(n,n+1)=1 for two consecutive integers n and n+1? Using Ferments theorem find mod X=2(mod3); x=3(mod5); x=2(mod7); solve for x Explain the two theorems that play important roles in public-key 10 cryptography. 15. Explain Euclid s Algorithm Explain Chinese remainder theorem and Discrete Logarithms State and explain the requirements of message Authentication 10
7 18. Explain the Authentication Functions Explain the message authentication codes Explain MD5 message digest Algorithm. 21. What are the differences between MD5 and MD4 5* 22. Explain Digital Signature Algorithm. 5* 23. Explain the different requirements of digital signature Briefly describe the two approaches for the digital signature function Explain in detail the Mutual Authentication and One-Way authentication Explain the basic uses of Message Encryption With Example State the requirements of Hash Functions What is the need for public key cryptography? Explain it s principle and how it can be adopted for i) Encryption and ii) Authentication. 29. Enunciate and explain the digital signature algorithm Network Security Content: Network Security Practice: Covers important network security tools and applications including Kerberos, X.509v3 certificates, PGP, S/MIME, IP Security, SSL/TLS and SET. Chapter 14: We study the two most important authentication specifications in current use: Kerberos and X.509. Chapter 15: Different provisions of authentication and confidentiality services as part of electronic mail facility. Chapter 16: We look at IP security scheme that has been developed to operate with the current IP and the emerging next generation IP, known as IPv6. Chapter 17: The need for web-based security is discussed. Sl No Questions Marks 1. Explain Kerberos 4? 8* 2. Explain kerberos 5? 8* 3. State and explain the differences between Keberos 4 and Keberos Explain at least 7 elements of X.509 public key certificate. 5. Explain the different methods of X.509 strong Authentication Procedures What does the key and policy information(of X.509 version 3) area include State the different features of PGP which has made it very popular. 8* 8. Explain the four types of keys which the PGP makes use of What is meant by PGP? why ois it widely used? Expalin the general format of PGP
8 message. 10. Explain the method revoking public keys in PGP List out the limitations of SMTP/ What is the importance of IP security? Discuss about the applications and the benefits of IP security. 13. What is a security association? With neat diagrams discuss about basic combinations of security associations 14. Explain the different MIME content Types. 15. State and describe the functions of S/MIME Give the summary of web security threats, consequences and counter measures 17. What is meant by a fire wall? Discuss about various types of fire wall configuration 18. Explain the role of User Agent in S/MIME Certificate processing Briefly explain the arbitrated digital signature schemes using conventional and public key encryptions 20. Describe the IP security Architecture What are the different applications of IPSec? 5* 22. Explain Transport and Tunnel modes of AH and ESP Show the format of IPSec Authentication Header What are the needs of padding field in a ESP packet Describe the IPSec ESP format with help of a neat diagram Explain Oakley key determination protocol and state its features. 27. What is Kerboras? Discuss the motivation and requirements of Kerberos approach. 28. What are the key features of a X.509 certificate? How are they issued and revoked by the certificate authority? 29. What are the five basic services available for the users of Pretty Good 20* Privacy (PGP)? How are they provided? 30. What is ISAKMP? Briefly explain the ISAKMP header format Write short note on Ipv4 and Ipv State some of the web security considerations With a neat diagram explain SSL Protocol Stack Explain SSL Handshake Protocol and SSL record protocol. 35. State the requirements of SET With the help of an example explain the steps in a Transaction using SET. 37. Explain the key features of SET Explain the steps in Payment Processing using SET What is the need for dual signatures in SET? How are they constructed? 40. Explain the secure socket layer (SSL-V3) architecture, indicating how the session state and connection state are defined
9 System Security Content System Security: Looks at system level security issues, including threat of and countermeasures for intruders, viruses and the use of firewalls and trusted systems. Chapter 18, 19: Examines variety of information access and service threats presented by hackers and programs that exploit vulnerabilities in network based computing systems. Chapter 20: We discuss some of the principles of firewall design. Sl.No. Questions Marks 1. What are the different classes of Intruders? Explain each of them State the different methods of learning passwords Explain the different Password selection strategies Explain the Vulnerability of password system used in Unix 6* 5. Explain the techniques that can be used to eliminate guessable passwords. 6. Explain the different methods of Intrusion Detection State and explain the different methods of checking activities are genuine 5 or not. 8. Explain with suitable example, how to overload extraction and insertion 5 operator 9. Explain Distributed Intrusion detection. 10. Explain trap Doors and Trojan Horses Explain the Nature Of Viruses How does a virus work and propagate 6* 13. Explain the different types of Viruses What is Macro viruses and why are they Threatening? 6* 15. Explain the Digital Immune System. 16. Explain the Antivirus Approaches Write a short note on Macro viruses What are the four basic techniques of choosing passwords? Compare their relative merits. 19. What is a Virus? What are the typical stages it passes through in its lifetime? Suggest a suitable virus structure. 20. Explain the design principles of Firewall Describe the firewall characteristics Explain the different types of firewalls Explain the different Firewall configurations Explain the concept of Trusted systems Write a short note on trusted systems 8
PESIT SOUTH CAMPUS 10IS835: INFORMATION AND NETWORK SECURITY. Faculty Name: Aisha Begam No. of Hours: 52
10IS835: INFORMATION AND NETWORK SECURITY Faculty Name: Aisha Begam No. of Hours: 52 Objectives In this electronic age, security and privacy are two of the issues whose importance cannot be stressed enough.
More informationCRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK
CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK UNIT-1 1. Answer the following: a. What is Non-repudiation b. Distinguish between stream and block ciphers c. List out the problems of one time pad d. Define
More information(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography
Code No: RR410504 Set No. 1 1. Write short notes on (a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography 3. (a) Illustrate Diffie-hellman Key Exchange scheme for GF(P) [6M] (b) Consider
More informationSankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank
Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology Question Bank Subject: Information Security (160702) Class: BE Sem. VI (CE/IT) Unit-1: Conventional
More informationTotal No. of Questions : 09 ] [ Total No.of Pages : 02
CS / IT 321 (CR) Total No. of Questions : 09 ] [ Total No.of Pages : 02 III/IV B. TECH. DEGREE EXAMINATIONS, OCT / NOV - 2015 Second Semester COMPUTER SCIENCE & ENGINEERING NETWK SECURITY Time : Three
More informationSRI VENKATESWARA COLLEGE OF ENGINEERING
COURSE DELIVERY PLAN - THEORY Page 1 of 6 Department of Information Technology B.E/B.Tech :IT/CS Regulation:2013 LP: CS6701 Rev. No: 01 Date: 30.06.2017 Sub. Code / Sub. Name : CS6701 CRYPTOGRAPHY & NETWORK
More informationKALASALINGAM UNIVERSITY
KALASALINGAM UNIVERSITY (Kalasalingam Academy of Research and Education) DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CLASS NOTES CRYPTOGRAPHY AND NETWOTK SECURITY (CSE 405) Prepared by M.RAJA AP/CSE
More informationIntroduction to information Security
First lecture Introduction to information Security Why Computer and information Security Cryptography Secret key algorithms: DES/AES Public key algorithms: RSA One-way hash functions & message digests:
More informationCryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 14: Folklore, Course summary, Exam requirements Ion Petre Department of IT, Åbo Akademi University 1 Folklore on
More informationAcronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector
Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National
More informationCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE FIFTH EDITION William Stallings Prentice Hall Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai
More informationIntroduction and Overview. Why CSCI 454/554?
Introduction and Overview CSCI 454/554 Why CSCI 454/554? Get Credits and Graduate Security is important More job opportunities More research funds 1 Workload Five homework assignments Two exams (open book
More informationMLR Institute of Technology
MLR Institute of Technology Laxma Reddy Avenue, Dundigal, Quthbullapur (M), Hyderabad 500 043 Phone Nos: 08418 204066 / 204088, Fax: 08418 204088 COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION Course
More informationChapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010
Cryptography Chapter 8 Network Security Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security An Introduction
More information(2½ hours) Total Marks: 75
(2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.
More informationM.D UNIVERSITY SCHEME OF STUDIES AND EXAMINATION M.TECH 2nd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER 3rd CBCS Scheme effective from
M.D UNIVERSITY SCHEME OF STUDIES AND EXAMINATION M.TECH 2nd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER 3rd CBCS Scheme effective from 2017-18 Sl. No Course No. Subject Teaching Schedule Examination
More informationThe question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).
Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 2 M.M:50 The question paper contains 40 multiple choice questions with four choices and students will have to pick the
More informationChapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads
Cryptography p y Chapter 8 Network Security Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security An Introduction
More informationName of chapter & details.
Course Title Course Code Information Security IT707 Theory : 03 Course Credit Practical : 01 Tutorial : 00 Course Learning Outcomes Credits : 04 On the completion of the course, students will be able to:
More informationInformation and Network Security UNIT-I PLANNING FOR SECURITY
UNIT-I PLANNING FOR SECURITY 1 a Discuss the system specific security policy.how managerial guidelines and technical specification can be used in SysSP? (December 2010) 1 b. Who is responsible for policy
More informationPrinciples of Information Security, Fourth Edition. Chapter 8 Cryptography
Principles of Information Security, Fourth Edition Chapter 8 Cryptography Learning Objectives Upon completion of this material, you should be able to: Chronicle the most significant events and discoveries
More informationAPNIC elearning: Cryptography Basics
APNIC elearning: Cryptography Basics 27 MAY 2015 03:00 PM AEST Brisbane (UTC+10) Issue Date: Revision: Introduction Presenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security
More informationProtecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets
Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures MIS5206 Week 11 Identity and Access Control Week 10 continued Cryptography, Public Key Encryption and
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives
More informationBCA III Network security and Cryptography Examination-2016 Model Paper 1
Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 1 M.M:50 The question paper contains 40 multiple choice questions with four choices and student will have to pick the correct
More informationInformation Security: Principles and Practice Second Edition. Mark Stamp
Information Security: Principles and Practice Second Edition Mark Stamp August 10, 2009 Contents Preface Second Edition Preface About The Author Acknowledgments xvii xix xxiii xxv 1 Introduction 1 1.1
More informationCryptography and Network Security Chapter 16. Fourth Edition by William Stallings
Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Chapter 16 IP Security If a secret piece of news is divulged by a spy before the time is ripe, he must be put to death,
More informationINSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad
INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, yderabad - 500 043 COMPUTER SCIENCE AND ENGINEERING COURSE DESCRIPTION FORM Course Title Course Code Regulation Course Structure Course Coordinator
More informationGlenda Whitbeck Global Computing Security Architect Spirit AeroSystems
Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems History 2000 B.C. Egyptian Hieroglyphics Atbash - Hebrew Original alphabet mapped to different letter Type of Substitution Cipher
More informationChapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,
Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls 32.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 32.2 Figure 32.1 Common structure
More informationAcademic Course Description
BEC012 - CRYPTOGRAPHY AND NETWORK SECURITY Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication Engineering BEC012 Cryptography
More informationDEPARTMENT OF COMPUTER APPLICATIONS B.C.A. - THIRD YEAR ( REGULATION) SIXTH SEMESTER LESSON PLAN SRM UNIVERSITY
DEPARTMENT OF COMPUTER APPLICATIONS B.C.A. - THIRD YEAR (2011-2012 REGULATION) SIXTH SEMESTER LESSON PLAN SRM UNIVERSITY FACULTY OF SCIENCE AND HUMANITIES SRM NAGAR, KATTANKULATHUR 603 203 Semester Course
More informationCryptography and Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,
More information06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security
1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security Dr. L. Christofi 1 0. Overview As the knowledge of computer networking and protocols has become more widespread, so the threat of
More informationIntroduction to Cryptography. Vasil Slavov William Jewell College
Introduction to Cryptography Vasil Slavov William Jewell College Crypto definitions Cryptography studies how to keep messages secure Cryptanalysis studies how to break ciphertext Cryptology branch of mathematics,
More informationA & B Section. Day. A Mrs. Krishnaveni S 1204 UB
SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF SOFTWARE ENGINEERING COURSE PLAN Course Code : SE1102 Course Title : NETWORKS SECURITY Semester : IV Course Time : FEB MAY 2016 Day A
More informationCryptographic Concepts
Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general
More informationKALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER COURSE PLAN
KALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER 2008-2012 COURSE PLAN Name of the Staff(s) : Mr. M.Raja Name of the Subject / Code : Cryptography and Network / CSE
More informationPublic Key Cryptography
graphy CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L07, Steve/Courses/2011/S2/CSS322/Lectures/rsa.tex,
More informationCS6701 CRYPTOGRAPHY AND NETWORK SECURITY 2 Mark Questions & Answers
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY 2 Mark Questions & Answers UNIT-I INTRODUCTION & NUMBER THEORY 1. What is meant by cryptography and cryptanalysis? (N/D-09) Cryptography is an art of writing hidden
More informationCryptography MIS
Cryptography MIS-5903 http://community.mis.temple.edu/mis5903sec011s17/ Cryptography History Substitution Monoalphabetic Polyalphabetic (uses multiple alphabets) uses Vigenere Table Scytale cipher (message
More informationL13. Reviews. Rocky K. C. Chang, April 10, 2015
L13. Reviews Rocky K. C. Chang, April 10, 2015 1 Foci of this course Understand the 3 fundamental cryptographic functions and how they are used in network security. Understand the main elements in securing
More informationCS 356 Internet Security Protocols. Fall 2013
CS 356 Internet Security Protocols Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5
More informationNetwork Security Chapter 8
Network Security Chapter 8 Cryptography Symmetric-Key Algorithms Public-Key Algorithms Digital Signatures Management of Public Keys Communication Security Authentication Protocols Email Security Web Security
More informationFIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 9 Encryption and Firewalls By Whitman, Mattord & Austin 2008 Course Technology Learning Objectives Describe the role encryption
More informationChapter 6. IP Security. Dr. BHARGAVI H. GOSWAMI Department of Computer Science Christ University
Chapter 6 IP Security Dr. BHARGAVI H. GOSWAMI Department of Computer Science Christ University +91 9426669020 bhargavigoswami@gmail.com Topic List 1. IP Security Overview 2. IP Security Architecture 3.
More informationThe University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus
The University of Jordan Accreditation & Quality Assurance Center COURSE Syllabus 1 Course title Computer Security 2 Course number 1901463 Credit hours (theory, practical) 3 3 Contact hours (theory, practical)
More informationDr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Public Key Cryptography Modular Arithmetic RSA
More informationComputer Security. 10r. Recitation assignment & concept review. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 10r. Recitation assignment & concept review Paul Krzyzanowski Rutgers University Spring 2018 April 3, 2018 CS 419 2018 Paul Krzyzanowski 1 1. What is a necessary condition for perfect
More informationWAP Security. Helsinki University of Technology S Security of Communication Protocols
WAP Security Helsinki University of Technology S-38.153 Security of Communication Protocols Mikko.Kerava@iki.fi 15.4.2003 Contents 1. Introduction to WAP 2. Wireless Transport Layer Security 3. Other WAP
More informationCryptography and Network Security
Cryptography and Network Security CRYPTOGRAPHY AND NETWORK SECURITY PRAKASH C. GUPTA Former Head Department of Information Technology Maharashtra Institute of Technology Pune Delhi-110092 2015 CRYPTOGRAPHY
More informationSecurity. Communication security. System Security
Security Communication security security of data channel typical assumption: adversary has access to the physical link over which data is transmitted cryptographic separation is necessary System Security
More informationData Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II
Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II Hello and welcome to today's lecture on secured communication.
More informationCryptography and secure channel. May 17, Networks and Security. Thibault Debatty. Outline. Cryptography. Public-key encryption
and secure channel May 17, 2018 1 / 45 1 2 3 4 5 2 / 45 Introduction Simplified model for and decryption key decryption key plain text X KE algorithm KD Y = E(KE, X ) decryption ciphertext algorithm X
More informationStudy Guide to Mideterm Exam
YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467b: Cryptography and Computer Security Handout #7 Professor M. J. Fischer February 20, 2012 Study Guide to Mideterm Exam For the exam, you are responsible
More informationNetwork Security. Chapter 8. MYcsvtu Notes.
Network Security Chapter 8 Network Security Some people who cause security problems and why. Cryptography Introduction Substitution ciphers Transposition ciphers One-time pads Fundamental cryptographic
More information14. Internet Security (J. Kurose)
14. Internet Security (J. Kurose) 1 Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer:
More informationInt ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28
Int ernet w orking Internet Security Literature: Forouzan: TCP/IP Protocol Suite : Ch 28 Internet Security Internet security is difficult Internet protocols were not originally designed for security The
More informationA New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam
More informationCSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L
CS 3461/5461: Introduction to Computer Networking and Internet Technologies Network Security Study: 21.1 21.5 Kannan Srinivasan 11-27-2012 Security Attacks, Services and Mechanisms Security Attack: Any
More informationComputer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 2 Cryptographic Tools First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Cryptographic Tools cryptographic algorithms
More informationCONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements
CONTENTS Preface Acknowledgements xiii xvii Chapter 1 TCP/IP Overview 1 1.1 Some History 2 1.2 TCP/IP Protocol Architecture 4 1.2.1 Data-link Layer 4 1.2.2 Network Layer 5 1.2.2.1 Internet Protocol 5 IPv4
More informationSymmetric, Asymmetric, and One Way Technologies
Symmetric, Asymmetric, and One Way Technologies Crypto Basics Ed Crowley Fall 2010 1 Topics: Symmetric & Asymmetric Technologies Kerckhoff s Principle Symmetric Crypto Overview Key management problem Attributes
More informationCryptanalysis. Ed Crowley
Cryptanalysis Ed Crowley 1 Topics Cryptanalysis History Modern Cryptanalysis Characterization of Cryptanalysis Attacks Attack Types 2 Cryptanalysis Science of cracking ciphers and codes, decoding secrets,
More informationCSC 474/574 Information Systems Security
CSC 474/574 Information Systems Security Topic 2.1 Introduction to Cryptography CSC 474/574 By Dr. Peng Ning 1 Cryptography Cryptography Original meaning: The art of secret writing Becoming a science that
More informationCSC/ECE 774 Advanced Network Security
Computer Science CSC/ECE 774 Advanced Network Security Topic 2. Network Security Primitives CSC/ECE 774 Dr. Peng Ning 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange;
More informationFor Tricia: never dull, never boring, the smartest and bravest person I know
For Tricia: never dull, never boring, the smartest and bravest person I know Vice President and Editorial Director, ECS: Marcia J. Horton Executive Editor: Tracy Johnson (Dunkelberger) Editorial Assistant:
More informationCOURSE PLAN. Name of the Faculty:: K.ROSHAN & M.A.MUNEER Designation: Assoc.Professor Asst. Professor. Name Of The Programme:: B.
COURSE PLAN Name of the Faculty:: K.ROSHAN & M.A.MUNEER Designation: Assoc.Professor Asst. Professor Department:: Information Technology COURSE DETAILS Name Of The Programme:: B.TECH Batch:: 2011 Designation
More informationDavid Wetherall, with some slides from Radia Perlman s security lectures.
David Wetherall, with some slides from Radia Perlman s security lectures. djw@cs.washington.edu Networks are shared: Want to secure communication between legitimate participants from others with (passive
More informationISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :
ISACA CISA ISACA CISA ( Certified Information Systems Auditor ) Download Full Version : http://killexams.com/pass4sure/exam-detail/cisa QUESTION: 390 Applying a digital signature to data traveling in a
More informationCSCE 715: Network Systems Security
CSCE 715: Network Systems Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina Security in Network Layer Implementing security in application layer provides flexibility in security
More informationClassical Cryptography. Thierry Sans
Classical Cryptography Thierry Sans Example and definitions of a cryptosystem Caesar Cipher - the oldest cryptosystem A shift cipher attributed to Julius Caesar (100-44 BC) MEET ME AFTER THE TOGA PARTY
More informationPublic-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7
Public-Key Cryptography Professor Yanmin Gong Week 3: Sep. 7 Outline Key exchange and Diffie-Hellman protocol Mathematical backgrounds for modular arithmetic RSA Digital Signatures Key management Problem:
More informationCSC 774 Network Security
CSC 774 Network Security Topic 2. Review of Cryptographic Techniques CSC 774 Dr. Peng Ning 1 Outline Encryption/Decryption Digital signatures Hash functions Pseudo random functions Key exchange/agreement/distribution
More informationJaringan Komputer (IF8505) Pengamanan jaringan komputer. Cryptography
Jaringan Komputer (IF8505) Pengamanan jaringan komputer Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Intro
More informationComputer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 08. Cryptography Part II Paul Krzyzanowski Rutgers University Spring 2018 March 23, 2018 CS 419 2018 Paul Krzyzanowski 1 Block ciphers Block ciphers encrypt a block of plaintext at a
More informationCryptography ThreeB. Ed Crowley. Fall 08
Cryptography ThreeB Ed Crowley Fall 08 Cryptanalysis History Modern Cryptanalysis Characterization of Cryptanalysis Attacks Attack Types Cryptanalysis. Science of cracking ciphers and codes, decoding secrets,
More informationACS / Computer Security And Privacy. Fall 2018 Mid-Term Review
ACS-3921-001/4921-001 Computer Security And Privacy Fall 2018 Mid-Term Review ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been adopted and/or modified
More informationMARIA COLLEGE OF ENGINEERING AND TECHNOLOGY
MARIA COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY Subject Name : Cryptography and Network Security 1. Specify the four categories of security threads? Interruption Interception
More informationChettinad College of Engineering and technology, Karur Department DEPARTMENT of Information OF ECETechnology Cryptography and Network Security Two
Chettinad College of Engineering and technology, Karur Department DEPARTMENT of Information OF ECETechnology Cryptography and Network Security Two Mark Questions UNIT I 1. What is OSI security architecture?
More informationSRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR
SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR 603203 DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONS QUESTION BANK 2017-18 Course / Branch : M.Sc.(CST) Semester / Year : VIII / IV Subject Name :
More informationCryptography (Overview)
Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography
More informationComputer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Chapter 8 Network Security Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.
More informationVPN Overview. VPN Types
VPN Types A virtual private network (VPN) connection establishes a secure tunnel between endpoints over a public network such as the Internet. This chapter applies to Site-to-site VPNs on Firepower Threat
More informationComputer Security 3/23/18
s s encrypt a block of plaintext at a time and produce ciphertext Computer Security 08. Cryptography Part II Paul Krzyzanowski DES & AES are two popular block ciphers DES: 64 bit blocks AES: 128 bit blocks
More informationInformation Security CS 526
Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication Topic 14: Secure Communication 1 Readings for This Lecture On Wikipedia Needham-Schroeder protocol (only the symmetric
More informationSecurity: Focus of Control. Authentication
Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized
More informationThe World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to
1 The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to compromises of various sorts, with a range of threats
More informationComputer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 08r. Pre-exam 2 Last-minute Review Cryptography Paul Krzyzanowski Rutgers University Spring 2018 March 26, 2018 CS 419 2018 Paul Krzyzanowski 1 Cryptographic Systems March 26, 2018 CS
More informationMost Common Security Threats (cont.)
Most Common Security Threats (cont.) Denial of service (DoS) attack Distributed denial of service (DDoS) attack Insider attacks. Any examples? Poorly designed software What is a zero-day vulnerability?
More informationNetwork Encryption 3 4/20/17
The Network Layer Network Encryption 3 CSC362, Information Security most of the security mechanisms we have surveyed were developed for application- specific needs electronic mail: PGP, S/MIME client/server
More informationChapter 3 Public Key Cryptography
Cryptography and Network Security Chapter 3 Public Key Cryptography Lectured by Nguyễn Đức Thái Outline Number theory overview Public key cryptography RSA algorithm 2 Prime Numbers A prime number is an
More informationChapter 19 Security. Chapter 19 Security
Chapter 19 Security Outline 19.1 Introduction 19.2 Cryptography 19.2.1 Secret-Key Cryptography 19.2.2 Public-Key Cryptography 19.3 Authentication 19.3.1 Basic Authentication 19.3.2 Biometrics and Smart
More informationChapter 15: Security. Operating System Concepts 8 th Edition,
Chapter 15: Security, Silberschatz, Galvin and Gagne 2009 Chapter 15: Security The Security Problem Program Threats System and Network Threats Cryptography as a Security Tool User Authentication Implementing
More informationProf. Shervin Shirmohammadi SITE, University of Ottawa. Security Architecture. Lecture 13: Prof. Shervin Shirmohammadi CEG
Lecture 13: Security Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 13-1 Network Assets and Security Threats Assets: Hardware (PC, workstation,
More informationNumber Theory and RSA Public-Key Encryption
Number Theory and RSA Public-Key Encryption Dr. Natarajan Meghanathan Associate Professor of Computer Science Jackson State University E-mail: natarajan.meghanathan@jsums.edu CIA Triad: Three Fundamental
More informationPrincess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)
Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536) Prepared by Dr. Samia Chelloug E-mail: samia_chelloug@yahoo.fr Content
More informationData Security and Privacy. Topic 14: Authentication and Key Establishment
Data Security and Privacy Topic 14: Authentication and Key Establishment 1 Announcements Mid-term Exam Tuesday March 6, during class 2 Need for Key Establishment Encrypt K (M) C = Encrypt K (M) M = Decrypt
More information19.1. Security must consider external environment of the system, and protect it from:
Module 19: Security The Security Problem Authentication Program Threats System Threats Securing Systems Intrusion Detection Encryption Windows NT 19.1 The Security Problem Security must consider external
More informationPROTECTING CONVERSATIONS
PROTECTING CONVERSATIONS Basics of Encrypted Network Communications Naïve Conversations Captured messages could be read by anyone Cannot be sure who sent the message you are reading Basic Definitions Authentication
More information