SRI VENKATESWARA COLLEGE OF ENGINEERING

Similar documents
A & B Section. Day. A Mrs. Krishnaveni S 1204 UB

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Academic Course Description

CRYPTOGRAPHY AND NETWORK SECURITY

10EC832: NETWORK SECURITY

SUMMARY OF INFORMATION ON EACH COURSE

For Tricia: never dull, never boring, the smartest and bravest person I know

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

Total No. of Questions : 09 ] [ Total No.of Pages : 02

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

KALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER COURSE PLAN

SYLLABUS WEEKLY SCHEDULE SEMESTER VII DEPARTMENT OF IT IV YEAR COURSE

Cryptography and Network Security

KALASALINGAM UNIVERSITY

M.D UNIVERSITY SCHEME OF STUDIES AND EXAMINATION M.TECH 2nd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER 3rd CBCS Scheme effective from

Lecture 1: Introduction to Security Architecture. for. Open Systems Interconnection

MLR Institute of Technology

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

Cryptography and Network Security

Name of chapter & details.

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Cryptography MIS

SKP Engineering College

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms

PESIT SOUTH CAMPUS 10IS835: INFORMATION AND NETWORK SECURITY. Faculty Name: Aisha Begam No. of Hours: 52

Cryptography and Network Security Chapter 16. Fourth Edition by William Stallings

Study Guide to Mideterm Exam

L13. Reviews. Rocky K. C. Chang, April 10, 2015

Introduction. Ahmet Burak Can Hacettepe University. Information Security

BCA III Network security and Cryptography Examination-2016 Model Paper 1

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

DEPARTMENT OF COMPUTER APPLICATIONS B.C.A. - THIRD YEAR ( REGULATION) SIXTH SEMESTER LESSON PLAN SRM UNIVERSITY

ECE 646 Fall 2009 Final Exam December 15, Multiple-choice test

Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements

Cryptography and Network Security

Introduction to information Security

Pretty Good Privacy (PGP

Introduction and Overview. Why CSCI 454/554?

Faculty of Science & Information Technology

APNIC elearning: Cryptography Basics

Public Key Cryptography

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,

Syllabus CS 430 Introduction to Computer Security Winter 2016

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

Network Security. Chapter 8. MYcsvtu Notes.

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

Cryptography Introduction

David Wetherall, with some slides from Radia Perlman s security lectures.

City University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester B 2017/18

8. SU-02 June-2016 All Syllabus Science Facutly B.Sc. Computer Maintance [Optional] Sem. V & VI - 1 -

Symmetric, Asymmetric, and One Way Technologies

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Department of Computer Science & Engineering Indian Institute of Technology Patna CS701 DISTRIBUTED SYSTEMS AND ALGORITHMS

Foreword Preface About the Author Aperitifs The Lexicon of Cryptography Cryptographic Systems Cryptanalysis Side Information Thomas Jefferson and the

(2½ hours) Total Marks: 75

SYLLABUS WEEKLY SCHEDULE VII SEMESTER DEPARTMENT OF INFORMATION TECHNOLOGY IV YEAR DEGREE COURSE

Information Security: Principles and Practice Second Edition. Mark Stamp

Topics. Number Theory Review. Public Key Cryptography

Cryptographic Systems

Public Key Algorithms

CS 134: Elements of Cryptography and Computer + Network Security Winter sconce.ics.uci.edu/134-w16/ CS 134 Background

Public Key Algorithms

Jaringan Komputer (IF8505) Pengamanan jaringan komputer. Cryptography

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous)

INSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad

CSCE 715: Network Systems Security

Outline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4

COURSE PLAN. Name of the Faculty:: K.ROSHAN & M.A.MUNEER Designation: Assoc.Professor Asst. Professor. Name Of The Programme:: B.

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Cryptography and secure channel. May 17, Networks and Security. Thibault Debatty. Outline. Cryptography. Public-key encryption

Network Security Chapter 8

C - Cryptography

EEC-484/584 Computer Networks

Public Key Cryptography

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7

Lecture 2 Applied Cryptography (Part 2)

Chapter 6. IP Security. Dr. BHARGAVI H. GOSWAMI Department of Computer Science Christ University

VPN Overview. VPN Types

Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA

Introduction to Network Security Missouri S&T University CPE 5420 Exam 2 Logistics

C - Cryptography

Elements of Cryptography and Computer and Networking Security Computer Science 134 (COMPSCI 134) Fall 2016 Instructor: Karim ElDefrawy

Crypto CS 485/ECE 440/CS 585 Fall 2017

Cipher Suite Configuration Mode Commands

SECURITY MANAGEMENT SYSTEM FUNCTIONAL ARCHITECTURE FOR ENTERPRISE NETWORK

Modern Algebra (MC - 301) L T P C

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Configuration of an IPSec VPN Server on RV130 and RV130W

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Basics of Cryptography

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

CCNA Security 1.1 Instructional Resource

Network Security. Chapter 4 Public Key Cryptography. Public Key Cryptography (4) Public Key Cryptography

Transcription:

COURSE DELIVERY PLAN - THEORY Page 1 of 6 Department of Information Technology B.E/B.Tech :IT/CS Regulation:2013 LP: CS6701 Rev. No: 01 Date: 30.06.2017 Sub. Code / Sub. Name : CS6701 CRYPTOGRAPHY & NETWORK SECURITY Unit : I -INTRODUCTION & NUMBER THEORY Unit Syllabus: Services, Mechanisms and attacks-the OSI security architecture-network security model-classical Encryption techniques (Symmetric cipher model, substitution techniques, transposition techniques, steganography).finite FIELDS AND NUMBER THEORY: Groups, Rings, Fields-Modular arithmeticeuclid s algorithm-finite fields- Polynomial Arithmetic Prime numbers-fermat s and Euler s theoremtesting for primality -The Chinese remainder theorem- Discrete logarithms. Objective: Understand OSI security architecture and classical encryption techniques. Acquire fundamental knowledge on the concepts of finite fields and number theory. 1 Services, Mechanisms and attacks T1(15-21) 2 OSI security architecture-network security model classical encryption techniques, substitution Caesar, play fair, Vigenere T1(14-42) 3 substitution techniques-hill,one time pad, transposition techniques, rotor machines - steganography T1(42-52) 4 FINITE FIELDS AND NUMBER THEORY: Groups, Rings, Fields T1(99-101) 5 Modular arithmetic T1(91-98) 6 Euclid's algorithm T1(88-91) 7 Finite fields, Polynomial Arithmetic T1(102-111) 8 Prime numbers,fermat's and Euler's theorem,testing for primality T1(231-241) 9 The Chinese remainder theorem T1(242-244) 10 Discrete logarithms T1(244-249) * duration: 50 minutes

COURSE DELIVERY PLAN - THEORY Page 2 of 6 Unit : II - BLOCK CIPHERS & PUBLIC KEY CRYPTOGRAPHY Unit Syllabus : Data Encryption Standard-Block cipher principles-block cipher modes of operation-advanced Encryption Standard (AES)-Triple DES-Blowfish-RC5 algorithm. Public key cryptography: Principles of public key cryptosystems-the RSA algorithm-key management - Diffie Hellman Key exchange-elliptic curve arithmetic-elliptic curve cryptography. Objective: Understand various block cipher and stream cipher models. 11 Data Encryption Standard T1(72-81) 12 Block cipher principles, block cipher modes of operation T1(174-190) 13,14 Triple DES, Advanced Encryption Standard (AES) T1(132-158) 15 Blowfish,RC5 algorithm 16,17 Public key cryptography: Principles of public key cryptosystems, The RSA algorithm-key management (R3(754-756), http://nptel.ac.in/ T1(253-277) 18 Diffie Hellman Key exchange T1(287-291) 19 Elliptic curve arithmetic T1(295-302) 20 Elliptic curve cryptography. T1(303-305) * duration: 50 mins

COURSE DELIVERY PLAN - THEORY Page 3 of 6 Unit : III - HASH FUNCTIONS AND DIGITAL SIGNATURES Unit Syllabus : Authentication requirement Authentication function MAC Hash function Security of hash function and MAC MD5 - SHA - HMAC CMAC - Digital signature and authentication protocols DSS EI Gamal Schnorr. Objective: Describe the principles of public key cryptosystems, hash functions and digital signature. 21,22 Authentication requirement, authentication function, MAC & its security T1(355-368) 23 Hash function, Security of hash function T1(328,367-372) 24 MD5, SHA, HMAC T1(369,329-350), T2(136-139) 25,26 CMAC, Digital signature and authentication protocols T1(373-375,393-398) 27,28 DSS, EI Gamal,Schnorr. T1(393-406) * duration: 50 mins

COURSE DELIVERY PLAN - THEORY Page 4 of 6 Unit : IV - SECURITY PRACTICE & SYSTEM SECURITY Unit Syllabus : SECURITY PRACTICE & SYSTEM SECURITY 8 Authentication applications Kerberos X.509 Authentication services - Internet Firewalls for Trusted System: Roles of Firewalls Firewall related terminology- Types of Firewalls - Firewall designs SET for E-Commerce Transactions. Intruder Intrusion detection system Virus and related threats Countermeasures Firewalls design principles Trusted systems Practical implementation of cryptography and security. Objective: Know about network security tools and authentication applications. 29 Authentication applications Kerberos T1(458-476) 30 X.509 Authentication services T1(435-443) 31 Internet Firewalls for Trusted System: Roles of Firewalls Firewall related terminology- Types of Firewalls - Firewall designs -Firewalls design principles R2(339-353) 32 SET for E-Commerce Transactions R2(355-366) 33 Intruder Intrusion detection system T1(566-590)&Online chapter 34 Virus and related threats Countermeasures T1(599-613) 35 Trusted system T1(634-639) 36 Practical implementation of cryptography and security. http://nptel.ac.in IOT security. duration: 50 mins

COURSE DELIVERY PLAN - THEORY Page 5 of 6 Unit : V - E-MAIL, IP & WEB SECURITY E-MAIL, IP & WEB SECURITY 9 E-mail Security: Security Services for E-mail-attacks possible through E-mail - establishing keys privacy-authentication of the source-message Integrity-Non-repudiation -Pretty Good Privacy- S/MIME.IPSecurity: Overview of IPSec - IP and IPv6-Authentication Header-Encapsulation Security Payload (ESP)-Internet Key Exchange (Phases of IKE, ISAKMP/IKE Encoding). Web Security: SSL/TLS Basic Protocol-computing the keys- client authentication-pki as deployed by SSLAttacks fixed in v3-exportability-encoding-secure Electronic Transaction (SET). Objective: Comprehend and apply email security,ip security,web security services and mechanisms. 37 E-mail Security: Security Services for E-mail-attacks possible through E-mail - establishing keys privacy-authentication of the source-message Integrity-Non-repudiation http://nptel.ac.in 38 Pretty Good Privacy T1(591-598) 39 S/MIME T1(599-615) 40,41 IPSecurity: Overview of IPSec - IP and IPv6-Authentication Header-Encapsulation Security Payload (ESP)-Internet Key Exchange (Phases of IKE, ISAKMP/IKE Encoding). T1(627-659) 42,43 Web Security: SSL/TLS Basic Protocol-computing the keysclient authentication-pki as deployed by SSLAttacks fixed in v3- Exportability-Encoding T1(528-544) 44,45 SET T1(544-560)

COURSE DELIVERY PLAN - THEORY Page 6 of 6 TEXT BOOKS: 1. William Stallings, Cryptography and Network Security, 6th Edition, Pearson Education, March 2013. (UNIT I,II,III,IV). 2. Charlie Kaufman, Radia Perlman and Mike Speciner, Network Security, Prentice Hall of India,2002. (UNIT V). REFERENCES: 1. Behrouz A. Ferouzan, Cryptography & Network Security, Tata Mc Graw Hill, 2007. 2. Man Young Rhee, Internet Security: Cryptographic Principles, Algorithms and Protocols, Wiley Publications, 2003. 3. Charles Pfleeger, Security in Computing, 4th Edition, Prentice Hall of India, 2006. 4. Ulysess Black, Internet Security Protocols, Pearson Education Asia, 2000. 5. Charlie Kaufman and Radia Perlman, Mike Speciner, Network Security, Second Edition, Private Communication in Public World, PHI 2002. 6. Bruce Schneier and Neils Ferguson, Practical Cryptography, First Edition, Wiley Dreamtech India Pvt Ltd, 2003. 7. Douglas R Simson Cryptography Theory and practice, First Edition, CRC Press, 1995.