KALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER COURSE PLAN

Similar documents
KALASALINGAM UNIVERSITY

SRI VENKATESWARA COLLEGE OF ENGINEERING

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

SUMMARY OF INFORMATION ON EACH COURSE

Academic Course Description

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

10EC832: NETWORK SECURITY

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

Name of chapter & details.

M.D UNIVERSITY SCHEME OF STUDIES AND EXAMINATION M.TECH 2nd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER 3rd CBCS Scheme effective from

Cipher Suite Configuration Mode Commands

Cryptography and Network Security

BCA III Network security and Cryptography Examination-2016 Model Paper 1

A & B Section. Day. A Mrs. Krishnaveni S 1204 UB

APNIC elearning: Cryptography Basics

Cryptographic Concepts

Faculty of Science & Information Technology

CRYPTOGRAPHY AND NETWORK SECURITY

Computer Security: Principles and Practice

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

Introduction to Cryptography. Vasil Slavov William Jewell College

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus

Study Guide to Mideterm Exam

8. SU-02 June-2016 All Syllabus Science Facutly B.Sc. Computer Maintance [Optional] Sem. V & VI - 1 -

CCNA Security 1.1 Instructional Resource

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

Other Topics in Cryptography. Truong Tuan Anh

Security. Communication security. System Security

Cryptography MIS

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

Topics. Number Theory Review. Public Key Cryptography

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements

(2½ hours) Total Marks: 75

Syllabus CS 430 Introduction to Computer Security Winter 2016

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous)

The most important development from the work on public-key cryptography is the digital signature. Message authentication protects two parties who

INSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad

Delineation of Trivial PGP Security

Introduction and Overview. Why CSCI 454/554?

Introduction to information Security

Public Key Algorithms

Summary of PGP Services

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

CSC/ECE 774 Advanced Network Security

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

A simple approach of Peer-to-Peer E-Cash system

CSC 774 Network Security

The Design of an Anonymous and a Fair Novel E-cash System

Symmetric, Asymmetric, and One Way Technologies

T Cryptography and Data Security

Hybrid Public Key Cryptosystem Combining RSA & DES Algorithms

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

Total No. of Questions : 09 ] [ Total No.of Pages : 02

CSE 127: Computer Security Cryptography. Kirill Levchenko

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Introduction. Ahmet Burak Can Hacettepe University. Information Security

ECE 646 Fall 2009 Final Exam December 15, Multiple-choice test

E-commerce security: SSL/TLS, SET and others. 4.1

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

Cryptography and Network Security

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

City University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester B 2017/18

NIST Cryptographic Toolkit

Core Security Services and Bootstrapping in the Cherubim Security System

Some Stuff About Crypto

For Tricia: never dull, never boring, the smartest and bravest person I know

Lecture 6 - Cryptography

C - Cryptography

Design and Analysis of New Symmetric Block Cipher Algorithm

Kurose & Ross, Chapters (5 th ed.)

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

International Journal of Scientific Research and Reviews

Key Exchange. References: Applied Cryptography, Bruce Schneier Cryptography and Network Securiy, Willian Stallings

UNIT - IV Cryptographic Hash Function 31.1

Chapter 11 Message Integrity and Message Authentication

Cloud Computing: Security Issues & Solution

SECURITY MANAGEMENT SYSTEM FUNCTIONAL ARCHITECTURE FOR ENTERPRISE NETWORK

Course Name: Information and Computers Networks Security Course Code: IT423

Symantec Corporation

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Cryptography Introduction

CUNY John Jay College of Criminal Justice MATH AND COMPUTER SCIENCE

Department of Computer Science & Engineering Indian Institute of Technology Patna CS701 DISTRIBUTED SYSTEMS AND ALGORITHMS

NETWORK SECURITY & CRYPTOGRAPHY

Basics of Cryptography

PGP: An Algorithmic Overview

MLR Institute of Technology

Jaap van Ginkel Security of Systems and Networks

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms

Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 7, 2013

PROTECTING CONVERSATIONS

Encryption. INST 346, Section 0201 April 3, 2018

L13. Reviews. Rocky K. C. Chang, April 10, 2015

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL

An Adaptive Play fair Cipher Algorithm for Secure Communication Using Radix 64 Conversion

ח'/סיון/תשע "א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms

Iqbal Singh Deptt. of Computer Science, Bhagwant University, Rajasthan, India

Variable Key : A new investigation in cryptography and results thereoff

Transcription:

KALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER 2008-2012 COURSE PLAN Name of the Staff(s) : Mr. M.Raja Name of the Subject / Code : Cryptography and Network / CSE 405 Year / Branch : IV / CSE Semester / Section : VI / A,D AIM: To make the students learn the principles and practices of cryptography and network security. To enable the students develop network security application programs. PRE-REQUISITE: Network is very important subject for any student who needs to have a career in networking. Students need to have sound skills in Mathematics and Computer Networks Engineering. OBJECTIVES: To know the methods of conventional encryption. To understand the concepts of public key encryption and number theory. To understand authentication and Hash functions. To know the network security tools and applications. To understand the system level security used. LEARNING OUTCOME: Students will have the basic knowledge about different methods of conventional encryption. Students will have the knowledge about the concepts of public key encryption and number theory. Students will acquire knowledge about authentication functions, message authentication odes and different hash algorithms. Students will acquire knowledge about network security tools and authentication applications. Sno Name of the Book Author / Publisher(s) / Year Companion Websites TEXT BOOK(S) 1 Network of India, Fifth Edition, 2011. http://williamstallings.com/crypto/c rypto5e.html REFERENCE BOOK(S) 1 2 Network Network of India, Fourth Edition, 2006. of India, Third Edition, 2003. http://williamstallings.com/crypto4e.html. http://williamstallings.com/crypto3e.html. 3 Cryptography and Network Atul Kahate, Tata McGraw- http://torrentz.ws/search/cryptograp Hill, 2003. hy-and-network--by-atul-

4 Applied Cryptography Bruce Schneier, John Wiley & Sons Inc, 2001. 5 in Computing Charles B. Pfleeger, Shari Lawrence Pfleeger, Third Edition, Pearson Education, 2003. Kahate. ------ http://inst.eecs.berkeley.edu/~cs161/ fa05/. WEB RESOURCE S.No Topic Classical Encryption 1. Techique Data Encryption 2. Standard Advanced Encryption 3. Standard Diffie-Hellman key 4. Exchange Introduction to 5. Number Theory Public key 6. cryptography and RSA 7. Message Authentication Codes 8. MD5 message Digest Website http://cobweb.ecn.purdue.edu/~kak/compsec/newlectures/lecture2.pdf http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf http://homes.esat.kuleuven.be/~abiryuko/enc/e31.pdf http://www.quadibloc.com/crypto/co040401.htm http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf http://buchholz.hs-bremen.de/aes/aes.pdf http://en.wikipedia.org/wiki/diffie-hellman http://ocw.mit.edu/nr/rdonlyres/electrical-engineering-and-computer- Science/6-042JFall-2005/E7AB2626-FB19-480E-95F5- A9C23C2BD885/0/ln6.pdf http://en.wikipedia.org/wiki/rsa http://www.ietf.org/rfc/rfc2437.txt ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1/pkcs-1v2-1.pdf http://en.wikipedia.org/wiki/message_authentication_code http://www.networksorcery.com/enp/rfc/rfc1321.txt algorithm 9. Secure Hash Algorithm http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf http://www.ietf.org/rfc/rfc3174.txt 10 RIPEMD en.wikipedia.org/wiki/ripemd-160 http://www.cosic.esat.kuleuven.be/publications/article-56.pdf http://homes.esat.kuleuven.be/~bosselae/ripemd160.html 11 Digital Signature Standard en.wikipedia.org/wiki/digital_signature_algorithm - 40k http://csrc.nist.gov/publications/fips/fips186-2/fips186-2-change1.pdf http://www.itl.nist.gov/fipspubs/fip186.htm 12 Kerberos en.wikipedia.org/wiki/kerberos_(protocol) - 41k http://searchsecurity.techtarget.com/sdefinition/0,,sid14_gci212437,00.html 13 X.509 Authentication Service en.wikipedia.org/wiki/x.509-47k http://publib.boulder.ibm.com/infocenter/systems/index.jsp?topic=/com.ibm.aix.security/doc/security/cas_pki.htm http://www.x5.net/faqs/crypto/q165.html 14 Electronic Mail 15 PGP en.wikipedia.org/wiki/pretty_good_privacy - 63k http://www.cs.columbia.edu/~hgs/teaching/security/slides/email2.pdf http://csrc.nist.gov/publications/nistpubs/800-45-version2/sp800-45v2.pdf 16 IP en.wikipedia.org/wiki/ipsec http://www.linuxsecurity.com/resource_files/documentation/tcpipsecurity.html http://www.cisco.com/en/us/tech/tk583/tk372/technologies_tech_note0918 6a0080094203.shtml#ipsec

Web links for similar courses offered at other universities: S.No Course Title Name of the University Web site 1 MCA 302 Information University of Delhi http://www.du.ac.in/course/syllabi/m CA1.pdf 2 630574 Computer Philadelphia University http://www.philadelphia.edu.jo/engine ering/cedes2006.pdf 3 Advanced Topics in Florida State University http://www.fsu.edu/ Cryptography and Network 4 Cryptography: Algorithms and Wilmington University http://www.wilmu.edu/courses/syllabi Applications 5 CSIE53400 Cryptography National Dong Hwa University pdf/sec310_generic.pdf http://sna.csie.ndhu.edu.tw/~cnyang/c ryptosyllabus2008.pdf Topic No LESSON PLAN: Topic Name 1. Need for Attacks, Services and Mechanisms Book to be referred UNIT I-INTRODUCTION No of Periods Cumulative No of Periods T1 CHAP 1 (31 51) 2 2 2. Classical encryption Techniques T1 CHAP 2 (55 82) 4 6 3. Block ciphers and data encryption standard T1 CHAP 3(90 120) 2 8 4. Tutorials - 1 9 UNIT II- SYMMETRIC ENCRYPTION 5. Advanced encryption standard T1 CHAP 5(171 202) 2 11 6. Symmetric ciphers- triple DES, Modes of operation T1 CHAP 6(216 233) 1 12 7. Stream ciphers RC4 T1 CHAP 6(256 261) 1 13 8. Stream ciphers Blowfish R2 CHAP 6(179-190) 1 14 9. Modern Symmetric encryption- IDEA R4 CHAP 13 2 16 10. Confidentiality using Symmetric Encryption R1 CHAP 7(199 226) 2 18 11. Tutorials - 1 19 UNIT III- PUBLIC-KEY ENCRYPTION AND HASH FUNCTIONS 12. Introduction to number theory T1 CHAP 8(267 286) 1 20 13. Public key cryptography and RSA T1 CHAP 9(290 315) 1 21 14. Key management and Distribution T1 CHAP 14(436-453) 1 22 15. Other public Key Cryptosystems Diffie T1 CHAP 10(325-332) 2 24

Hellmen Key Exchange, ElGamal 16. Cryptographic Hash functions -SHA T1 CHAP 11(351-376) 3 27 17. Message authentication Codes (MAC) T1 CHAP 12(386-404) 3 30 HMAC, DAA 18. Hash and MAC algorithms MD5, RIPEMD R3 CHAP 12(347-371) 2 32 19. Tutorials - 1 33 UNIT IV- AUTHENTICATION 20. Digital signatures DSS, DSA T1 CHAP 13(420-424) 2 35 T1 CHAP 13(427-430) 21. X.509 Certificates T1 CHAP 14(453-461) 1 36 22. Authentication principles T1 CHAP 15( 469 476 ) 1 37 23. Authentication applications- Kerberos V4 T1 CHAP 15(476-493) 2 39 & V5 24. Tutorials - 1 40 UNIT V- SECURITY SERVICES 25. Web security T1 CHAP 16 (509-525) 3 43 26. Web security - Secure Electronic R1 CHAP 17 (549 560) 1 44 Transaction 27. E-Mail security T1 CHAP 18 (591-627) 3 47 28. IP T1 CHAP 19(639-662) 3 50 Test portions: Test No Topic No I 1-7 II 8-15 III 16-21 Related Magazine: International Journal of and Networks International Journal of Applied Cryptography (www.inderscience.com) Assignment: 1 1. Using this Play fair matrix M F H I/J K U N O P Q Z V W X Y E L A R G D S T B C Encrypt this message: Must see you over cadogan west. Coming at once.

2. Encrypt the Message Meet me at the Usual place at ten rather than eight o Clock using the Hill cipher with the key 9 4 5 7. Show your Calculation and results. 3. using the Vigenere cipher, encrypt the word explanation using the key leg. Assignment 2: 1. Find integers x such that a.5x = 4 mod 3 b.7x=6 mod 5 c.9x=8 mod 7 2.Prove the Following a.[(a mod n)- (b mod n)] mod n= (a-b) mod n b.[(a mod n) X (b mod n)] mod n= (axb) mod n Assignment 3: Perform encryption and decryption using RSA algorithm a. p=3; q=11; e=7; m=5 b. p=5; q=11; e=3; m=9 c. p=7;q=11;e=17;m=8 d. p=11;q=13;e=11;m=7 e. p=17;q=31;e=7;m=2 Additional Topics (suggested for seminar) Blowfish RC4 RC5 Steganography Stream Cipher Applications Digital Signature Services in Internet E-commerce Authentication Technology and intelligent authentication devices Auditing Techniques Standards Intelligent Agents in Network Cyber Crimes and Forensic Staff in charge(s) Verified By