COURSE DELIVERY PLAN - THEORY Page 1 of 6 Department of Information Technology B.E/B.Tech :IT/CS Regulation:2013 LP: CS6701 Rev. No: 01 Date: 30.06.2017 Sub. Code / Sub. Name : CS6701 CRYPTOGRAPHY & NETWORK SECURITY Unit : I -INTRODUCTION & NUMBER THEORY Unit Syllabus: Services, Mechanisms and attacks-the OSI security architecture-network security model-classical Encryption techniques (Symmetric cipher model, substitution techniques, transposition techniques, steganography).finite FIELDS AND NUMBER THEORY: Groups, Rings, Fields-Modular arithmeticeuclid s algorithm-finite fields- Polynomial Arithmetic Prime numbers-fermat s and Euler s theoremtesting for primality -The Chinese remainder theorem- Discrete logarithms. Objective: Understand OSI security architecture and classical encryption techniques. Acquire fundamental knowledge on the concepts of finite fields and number theory. 1 Services, Mechanisms and attacks T1(15-21) 2 OSI security architecture-network security model classical encryption techniques, substitution Caesar, play fair, Vigenere T1(14-42) 3 substitution techniques-hill,one time pad, transposition techniques, rotor machines - steganography T1(42-52) 4 FINITE FIELDS AND NUMBER THEORY: Groups, Rings, Fields T1(99-101) 5 Modular arithmetic T1(91-98) 6 Euclid's algorithm T1(88-91) 7 Finite fields, Polynomial Arithmetic T1(102-111) 8 Prime numbers,fermat's and Euler's theorem,testing for primality T1(231-241) 9 The Chinese remainder theorem T1(242-244) 10 Discrete logarithms T1(244-249) * duration: 50 minutes
COURSE DELIVERY PLAN - THEORY Page 2 of 6 Unit : II - BLOCK CIPHERS & PUBLIC KEY CRYPTOGRAPHY Unit Syllabus : Data Encryption Standard-Block cipher principles-block cipher modes of operation-advanced Encryption Standard (AES)-Triple DES-Blowfish-RC5 algorithm. Public key cryptography: Principles of public key cryptosystems-the RSA algorithm-key management - Diffie Hellman Key exchange-elliptic curve arithmetic-elliptic curve cryptography. Objective: Understand various block cipher and stream cipher models. 11 Data Encryption Standard T1(72-81) 12 Block cipher principles, block cipher modes of operation T1(174-190) 13,14 Triple DES, Advanced Encryption Standard (AES) T1(132-158) 15 Blowfish,RC5 algorithm 16,17 Public key cryptography: Principles of public key cryptosystems, The RSA algorithm-key management (R3(754-756), http://nptel.ac.in/ T1(253-277) 18 Diffie Hellman Key exchange T1(287-291) 19 Elliptic curve arithmetic T1(295-302) 20 Elliptic curve cryptography. T1(303-305) * duration: 50 mins
COURSE DELIVERY PLAN - THEORY Page 3 of 6 Unit : III - HASH FUNCTIONS AND DIGITAL SIGNATURES Unit Syllabus : Authentication requirement Authentication function MAC Hash function Security of hash function and MAC MD5 - SHA - HMAC CMAC - Digital signature and authentication protocols DSS EI Gamal Schnorr. Objective: Describe the principles of public key cryptosystems, hash functions and digital signature. 21,22 Authentication requirement, authentication function, MAC & its security T1(355-368) 23 Hash function, Security of hash function T1(328,367-372) 24 MD5, SHA, HMAC T1(369,329-350), T2(136-139) 25,26 CMAC, Digital signature and authentication protocols T1(373-375,393-398) 27,28 DSS, EI Gamal,Schnorr. T1(393-406) * duration: 50 mins
COURSE DELIVERY PLAN - THEORY Page 4 of 6 Unit : IV - SECURITY PRACTICE & SYSTEM SECURITY Unit Syllabus : SECURITY PRACTICE & SYSTEM SECURITY 8 Authentication applications Kerberos X.509 Authentication services - Internet Firewalls for Trusted System: Roles of Firewalls Firewall related terminology- Types of Firewalls - Firewall designs SET for E-Commerce Transactions. Intruder Intrusion detection system Virus and related threats Countermeasures Firewalls design principles Trusted systems Practical implementation of cryptography and security. Objective: Know about network security tools and authentication applications. 29 Authentication applications Kerberos T1(458-476) 30 X.509 Authentication services T1(435-443) 31 Internet Firewalls for Trusted System: Roles of Firewalls Firewall related terminology- Types of Firewalls - Firewall designs -Firewalls design principles R2(339-353) 32 SET for E-Commerce Transactions R2(355-366) 33 Intruder Intrusion detection system T1(566-590)&Online chapter 34 Virus and related threats Countermeasures T1(599-613) 35 Trusted system T1(634-639) 36 Practical implementation of cryptography and security. http://nptel.ac.in IOT security. duration: 50 mins
COURSE DELIVERY PLAN - THEORY Page 5 of 6 Unit : V - E-MAIL, IP & WEB SECURITY E-MAIL, IP & WEB SECURITY 9 E-mail Security: Security Services for E-mail-attacks possible through E-mail - establishing keys privacy-authentication of the source-message Integrity-Non-repudiation -Pretty Good Privacy- S/MIME.IPSecurity: Overview of IPSec - IP and IPv6-Authentication Header-Encapsulation Security Payload (ESP)-Internet Key Exchange (Phases of IKE, ISAKMP/IKE Encoding). Web Security: SSL/TLS Basic Protocol-computing the keys- client authentication-pki as deployed by SSLAttacks fixed in v3-exportability-encoding-secure Electronic Transaction (SET). Objective: Comprehend and apply email security,ip security,web security services and mechanisms. 37 E-mail Security: Security Services for E-mail-attacks possible through E-mail - establishing keys privacy-authentication of the source-message Integrity-Non-repudiation http://nptel.ac.in 38 Pretty Good Privacy T1(591-598) 39 S/MIME T1(599-615) 40,41 IPSecurity: Overview of IPSec - IP and IPv6-Authentication Header-Encapsulation Security Payload (ESP)-Internet Key Exchange (Phases of IKE, ISAKMP/IKE Encoding). T1(627-659) 42,43 Web Security: SSL/TLS Basic Protocol-computing the keysclient authentication-pki as deployed by SSLAttacks fixed in v3- Exportability-Encoding T1(528-544) 44,45 SET T1(544-560)
COURSE DELIVERY PLAN - THEORY Page 6 of 6 TEXT BOOKS: 1. William Stallings, Cryptography and Network Security, 6th Edition, Pearson Education, March 2013. (UNIT I,II,III,IV). 2. Charlie Kaufman, Radia Perlman and Mike Speciner, Network Security, Prentice Hall of India,2002. (UNIT V). REFERENCES: 1. Behrouz A. Ferouzan, Cryptography & Network Security, Tata Mc Graw Hill, 2007. 2. Man Young Rhee, Internet Security: Cryptographic Principles, Algorithms and Protocols, Wiley Publications, 2003. 3. Charles Pfleeger, Security in Computing, 4th Edition, Prentice Hall of India, 2006. 4. Ulysess Black, Internet Security Protocols, Pearson Education Asia, 2000. 5. Charlie Kaufman and Radia Perlman, Mike Speciner, Network Security, Second Edition, Private Communication in Public World, PHI 2002. 6. Bruce Schneier and Neils Ferguson, Practical Cryptography, First Edition, Wiley Dreamtech India Pvt Ltd, 2003. 7. Douglas R Simson Cryptography Theory and practice, First Edition, CRC Press, 1995.