10EC832: NETWORK SECURITY

Similar documents
PESIT SOUTH CAMPUS 10IS835: INFORMATION AND NETWORK SECURITY. Faculty Name: Aisha Begam No. of Hours: 52

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

Total No. of Questions : 09 ] [ Total No.of Pages : 02

SRI VENKATESWARA COLLEGE OF ENGINEERING

KALASALINGAM UNIVERSITY

Introduction to information Security

Cryptography and Network Security

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

CRYPTOGRAPHY AND NETWORK SECURITY

Introduction and Overview. Why CSCI 454/554?

MLR Institute of Technology

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

(2½ hours) Total Marks: 75

M.D UNIVERSITY SCHEME OF STUDIES AND EXAMINATION M.TECH 2nd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER 3rd CBCS Scheme effective from

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

Name of chapter & details.

Information and Network Security UNIT-I PLANNING FOR SECURITY

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

APNIC elearning: Cryptography Basics

Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

BCA III Network security and Cryptography Examination-2016 Model Paper 1

Information Security: Principles and Practice Second Edition. Mark Stamp

Cryptography and Network Security Chapter 16. Fourth Edition by William Stallings

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,

Academic Course Description

DEPARTMENT OF COMPUTER APPLICATIONS B.C.A. - THIRD YEAR ( REGULATION) SIXTH SEMESTER LESSON PLAN SRM UNIVERSITY

Cryptography and Network Security

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

Introduction to Cryptography. Vasil Slavov William Jewell College

A & B Section. Day. A Mrs. Krishnaveni S 1204 UB

Cryptographic Concepts

KALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER COURSE PLAN

Public Key Cryptography

CS6701 CRYPTOGRAPHY AND NETWORK SECURITY 2 Mark Questions & Answers

Cryptography MIS

L13. Reviews. Rocky K. C. Chang, April 10, 2015

CS 356 Internet Security Protocols. Fall 2013

Network Security Chapter 8

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2

Chapter 6. IP Security. Dr. BHARGAVI H. GOSWAMI Department of Computer Science Christ University

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Computer Security. 10r. Recitation assignment & concept review. Paul Krzyzanowski. Rutgers University. Spring 2018

WAP Security. Helsinki University of Technology S Security of Communication Protocols

Cryptography and Network Security

Security. Communication security. System Security

Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II

Cryptography and secure channel. May 17, Networks and Security. Thibault Debatty. Outline. Cryptography. Public-key encryption

Study Guide to Mideterm Exam

Network Security. Chapter 8. MYcsvtu Notes.

14. Internet Security (J. Kurose)

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

Computer Security: Principles and Practice

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements

Symmetric, Asymmetric, and One Way Technologies

Cryptanalysis. Ed Crowley

CSC 474/574 Information Systems Security

CSC/ECE 774 Advanced Network Security

For Tricia: never dull, never boring, the smartest and bravest person I know

COURSE PLAN. Name of the Faculty:: K.ROSHAN & M.A.MUNEER Designation: Assoc.Professor Asst. Professor. Name Of The Programme:: B.

David Wetherall, with some slides from Radia Perlman s security lectures.

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :

CSCE 715: Network Systems Security

Classical Cryptography. Thierry Sans

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7

CSC 774 Network Security

Jaringan Komputer (IF8505) Pengamanan jaringan komputer. Cryptography

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Cryptography ThreeB. Ed Crowley. Fall 08

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

MARIA COLLEGE OF ENGINEERING AND TECHNOLOGY

Chettinad College of Engineering and technology, Karur Department DEPARTMENT of Information OF ECETechnology Cryptography and Network Security Two

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

Cryptography (Overview)

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

VPN Overview. VPN Types

Computer Security 3/23/18

Information Security CS 526

Security: Focus of Control. Authentication

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Most Common Security Threats (cont.)

Network Encryption 3 4/20/17

Chapter 3 Public Key Cryptography

Chapter 19 Security. Chapter 19 Security

Chapter 15: Security. Operating System Concepts 8 th Edition,

Prof. Shervin Shirmohammadi SITE, University of Ottawa. Security Architecture. Lecture 13: Prof. Shervin Shirmohammadi CEG

Number Theory and RSA Public-Key Encryption

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Data Security and Privacy. Topic 14: Authentication and Key Establishment

19.1. Security must consider external environment of the system, and protect it from:

PROTECTING CONVERSATIONS

Transcription:

10EC832: NETWORK SECURITY Objective: In this electronic age, security and privacy are two of the issues whose importance cannot be stressed enough. How do we ensure the systems we use are resistant to electronic fraud? What are some of the safe computing/internet practices that we can follow to avoid attacks by hackers? How do we share private data over a public channel and be immune to eavesdropping or interceptions? How do we ensure information is sent to an authentic source and guard against repudiation? These are some of the many questions that a computer or information scientist and engineer ought to be aware of. From times immemorial, cryptography has captured the imagination of people. Though the discussions are largely qualitative and not mathematically involved, the course provides a broad overview of the challenges that face electronic storage and communication. Recognizing that it is as important in knowing what has been done to fortify against possible attacks over time, in the words of Dr. Bill Stallings (the author of the prescribed text), the course provides a survey of both the principles and practices of cryptography and network security.

06EC832: NETWORK SECURITY Faculty :Shivaraj Karki No # Of Hours: 52 Class# Chapter Title/ Reference Literature OVERVIEW Topics to be covered %of Portion Covered Reference Chapter Cumulative 1 UNIT-1 Services, Mechanisms and Attacks 2 The OSI Security architecture 3 A model for network security SYMMETRIC CIPHERS UNIT-2 4 Symmetric Cipher Model,Substitution Techniques 5 Transposition Techniques 6 Simplified DES 7 Data encryption standard (DES), The strength of DES UNIT-2 8 The strength of DES 9 Differential and Linear Cryptanalysis 10 Block Cipher Design Principles and Modes of Operation 11 Evaluation Criteria for Advanced Encryption Standard 12 The AES Cipher UNIT-3 PUBLIC KEY ENCRYPTION AND HASH FUNCTIONS 5.76% 5.76% 17.30% 17.30% 23.06% 15.38% 38.44% 13 Principles of Public-Key Cryptosystems 14 The RSA algorithm UNIT-3 15 Key Management 16 Diffie - Hellman Key Exchange 17 Elliptic Curve Arithmetic 18 Authentication functions 19 Authentication functions 20 Hash Functions WEB SECURITY 11.54% 50% UNIT-5 21 Web Security Consideration 22 UNIT-5 Web Security Consideration 23 Security socket layer (SSL) 24 Transport layer security 25 Secure Electronic Transaction 26 Secure Electronic Transaction INTRUDERS 11.54% 61.54% 27 Intruders 28 UNIT-6 Intruders 29 Intrusion Detection 30 Intrusion Detection 31 Password Management 32 Password Management MALICIOUS SOFTWARE 11.54% 73.08% UNIT-7 33 Viruses and Related Threats

34 Viruses and Related Threats 35 Viruses and Related Threats 36 Virus Countermeasures 37 Virus Countermeasures 38 Virus Countermeasures DIGITAL SIGNATURES AND AUTHENTICATION 13.46% 86.54% UNIT-4 PROTOCOLS 39 Digital signatures UNIT-4 40 Digital signatures 41 Authentication Protocols 42 Authentication Protocols 43 Authentication Protocols 44 Digital Signature Standard 45 Digital Signature Standard FIREWALLS 13.46% 100% UNIT-8 46 Firewalls Design Principles 47 Firewalls Design Principles 48 UNIT-8 Firewalls Design Principles 49 Trusted Systems 50 Trusted Systems 51 REVIEW-QUESTION PAPERS 52 REVIEW-QUESTION PAPERS LITERATURE: Book Type Code Title & Author Publication Info Edition Publisher Year Text Book T Cryptography and Network Security: Principles and Practices, William Stallings Third Edition Pearson Education 2003 Reference Book Reference Book R1 R2 SYLLABUS FOR INTERNALS Test # Syllabus T1 UNIT # 1,2,3 T2 UNIT # 5,6,7 T3 UNIT # 4,8 Cryptography and Network Security: Behrouz A Forouzon Atul Kahate, Cryptography and Network Security Second Edition First Edition Tata McGraw Hill Tata McGraw Hill 2007 2003

QUESTION BANK CRYPTOGRAPHY-I Content Conventional Encryption: A detailed examination of conventional encryption algorithms and design principles, including a discussion of the use of conventional encryption for confidentiality. Chapter 1: Serves as an introduction to the rest of the chapters. Chapter 2: It provides a gentle and interesting introduction to cryptography and cryptanalysis and highlights important concepts. Chapter 3: Introduces the principles of modern symmetric cryptography, with an emphasis on the most widely used encryption technique, the Data Encryption Standard (DES). Chapter 6: Extends the discussion to include some of the most important contemporary block cipher algorithms such as triple DES and Blowfish. Chapter 7: Discusses the end-to-end versus link encryption, techniques for achieving traffic confidentiality and key distribution techniques. Random number generation is also discussed. Sl No Questions Marks 1. Explain the classification of Security Services. 6 2. Define the term information security. With examples discuss about various security violations during transmission of information 3. Describe the different Security attacks with figure 6 4. Explain briefly the four types of security attacks that are normally encountered. Also distinguish between active and passive attacks 5. Explain the model for network Security 6 6. With a neat diagram explain each component of Model of Conventional 6 Crypto System. 7. Explain briefly the four types of security attacks that are normally 10 encountered. Also distinguish between active and passive attacks 8. Discuss Briefly about cryptanalysis 5 9. Explain Caesar cipher & mono alphabetic ciphers method of encryption 10 10. Explain simplified DES method of encryption 11. Explain what is meant by diffusion & confusion 6 12. Explain the classical Feistel cipher structure. 10 13. Explain the differential Cryptanalysis mechanism 6*

14. Bring out the difference between the following pairs of terms: i) Diffusion and confusion ii) Steganography and Cryptography iii) Known and chosen plaintext Cryptanalysis 15. Write a brief note on Steganography. 10 16. What is the need for public key cryptography? Explain its principle and how it can be adopted for 1) encryption and 2) authentication 17. Explain in brief the schemes public key authority and public key certificates proposed for the distribution of public keys 18. With suitable diagrams show how public key encryption can be used in confidentiality, authentication and both 19. With schematic diagrams explain the single round of DES encryption algorithm 20. Explain the principle of Diffie- Hellman key exchange with a suitable example 21. Briefly explain the classical encryption techniques. 20 22. Briefly describe the two basic building blocks of all encryption techniques 10 23. Briefly explain the Simplified DES scheme 10 24. Describe stream ciphers and block ciphers 6 25. Explain the motivation for Feistel cipher structure 6 26. Explain Feistel Decryption algorithm 6 27. Describe briefly the DES encryption. 6 28. Describe briefly the DES decryption. 6 29. Explain Single Round DES algorithm 10 30. Write a short note on Strength of DES 8 31. Write a short note on Differential and linear cryptanalysis 10 32. What is meant by triple DES How does it over come the problem encountered in Double DES 33. How does triple DES differ from double DES? Discuss about the known plain text attack on triple DES 34. Explain the design principles of IDEA. 35. With the structure of IDEA explain the algorithm of IDEA 6* 36. With a detailed diagram explain the method of encryption and decryption 10 using Blowfish Algorithm 37. Define what is link and End-to-End encryption with advantages and 6* disadvantages of each. 38. State the steps followed in Key Distribution Scenario. With Diagram 6* 39. Explain Blum Blum Shub generator 6 40. Explain a typical key distribution scenario. What are the tradeoffs involved 14* in determining the life of a particular session key. 41. Write a short note on Potential Locations for confidentiality Attacks. 10 42. Briefly explain Traffic Confidentiality 10 43. Describe the different sources of Random numbers 15

Cryptography II Content Public Key Encryption and Hash Functions: A detailed examination of public key encryption algorithms and design principles. This part also examines the use of message authentication codes as well as digital signatures and public-key certificates. Chapter 8: This chapter gives an introduction to number theory and discusses Fermat s and Euler s theorems as well as testing for primality. Chapter 9: This chapter introduces public-key encryption and how it can be used to provide confidentiality. The RSA algorithm is discussed in detail. Chapter 10: We study the public-key schemes that are based on number theory. Chapter 11: This chapter analyzes the requirements of authentication and provides a systematic presentation of approaches to authentication. Chapter 12: Extends the discussion through the message digest algorithm Chapter 13: Digital signature is an important type of authentication. Various authentication techniques based on digital signatures are building blocks in putting together authentication algorithms. SlNo. Questions Marks 1. What are the important characteristics of that public key Cryptosystems 10 follow. Explain the public key encryption process 2. Differentiate between public key and conventional encryption 6* techniques. 3. State the requirements of public key cryptography 10 4. Describe the different applications for Public-Key Cryptosystems 10 5. Write a short note on Public-Key Cryptanalysis. 8 6. Describe RSA algorithm. 7. Explain the Security of RSA. 10 8. Explain the different methods of Distribution of Public Keys. 9. Briefly explain the Public-Key Distribution of Secret Keys. 8 10. Explain DIFFIE-HELLMAN key exchange method. 11. Why is gcd(n,n+1)=1 for two consecutive integers n and n+1? 5 12. Using Ferments theorem find 3 201 mod11 5 13. X=2(mod3); x=3(mod5); x=2(mod7); solve for x 5 14. Explain the two theorems that play important roles in public-key 10 cryptography. 15. Explain Euclid s Algorithm. 10 16. Explain Chinese remainder theorem and Discrete Logarithms. 12 17. State and explain the requirements of message Authentication 10

18. Explain the Authentication Functions. 14 19. Explain the message authentication codes. 10 20. Explain MD5 message digest Algorithm. 21. What are the differences between MD5 and MD4 5* 22. Explain Digital Signature Algorithm. 5* 23. Explain the different requirements of digital signature 8 24. Briefly describe the two approaches for the digital signature function 10 25. Explain in detail the Mutual Authentication and One-Way authentication 14 26. Explain the basic uses of Message Encryption With Example 10 27. State the requirements of Hash Functions 8 28. What is the need for public key cryptography? Explain it s principle and how it can be adopted for i) Encryption and ii) Authentication. 29. Enunciate and explain the digital signature algorithm Network Security Content: Network Security Practice: Covers important network security tools and applications including Kerberos, X.509v3 certificates, PGP, S/MIME, IP Security, SSL/TLS and SET. Chapter 14: We study the two most important authentication specifications in current use: Kerberos and X.509. Chapter 15: Different provisions of authentication and confidentiality services as part of electronic mail facility. Chapter 16: We look at IP security scheme that has been developed to operate with the current IP and the emerging next generation IP, known as IPv6. Chapter 17: The need for web-based security is discussed. Sl No Questions Marks 1. Explain Kerberos 4? 8* 2. Explain kerberos 5? 8* 3. State and explain the differences between Keberos 4 and Keberos5 10 4. Explain at least 7 elements of X.509 public key certificate. 5. Explain the different methods of X.509 strong Authentication Procedures. 10 6. What does the key and policy information(of X.509 version 3) area include 8 10 7. State the different features of PGP which has made it very popular. 8* 8. Explain the four types of keys which the PGP makes use of. 8 9. What is meant by PGP? why ois it widely used? Expalin the general format of PGP

message. 10. Explain the method revoking public keys in PGP. 5 11. List out the limitations of SMTP/822 8 12. What is the importance of IP security? Discuss about the applications and the benefits of IP security. 13. What is a security association? With neat diagrams discuss about basic combinations of security associations 14. Explain the different MIME content Types. 15. State and describe the functions of S/MIME. 5 16. Give the summary of web security threats, consequences and counter measures 17. What is meant by a fire wall? Discuss about various types of fire wall configuration 18. Explain the role of User Agent in S/MIME Certificate processing. 5 19. Briefly explain the arbitrated digital signature schemes using conventional and public key encryptions 20. Describe the IP security Architecture. 10 21. What are the different applications of IPSec? 5* 22. Explain Transport and Tunnel modes of AH and ESP 5 23. Show the format of IPSec Authentication Header 8 24. What are the needs of padding field in a ESP packet 4 25. Describe the IPSec ESP format with help of a neat diagram. 10 26. Explain Oakley key determination protocol and state its features. 27. What is Kerboras? Discuss the motivation and requirements of Kerberos approach. 28. What are the key features of a X.509 certificate? How are they issued and revoked by the certificate authority? 29. What are the five basic services available for the users of Pretty Good 20* Privacy (PGP)? How are they provided? 30. What is ISAKMP? Briefly explain the ISAKMP header format 10 31. Write short note on Ipv4 and Ipv6. 10 32. State some of the web security considerations 4 33. With a neat diagram explain SSL Protocol Stack. 8 34. Explain SSL Handshake Protocol and SSL record protocol. 35. State the requirements of SET 10 36. With the help of an example explain the steps in a Transaction using SET. 37. Explain the key features of SET. 10 38. Explain the steps in Payment Processing using SET 10 39. What is the need for dual signatures in SET? How are they constructed? 40. Explain the secure socket layer (SSL-V3) architecture, indicating how the session state and connection state are defined

System Security Content System Security: Looks at system level security issues, including threat of and countermeasures for intruders, viruses and the use of firewalls and trusted systems. Chapter 18, 19: Examines variety of information access and service threats presented by hackers and programs that exploit vulnerabilities in network based computing systems. Chapter 20: We discuss some of the principles of firewall design. Sl.No. Questions Marks 1. What are the different classes of Intruders? Explain each of them. 5 2. State the different methods of learning passwords. 5 3. Explain the different Password selection strategies. 6 4. Explain the Vulnerability of password system used in Unix 6* 5. Explain the techniques that can be used to eliminate guessable passwords. 6. Explain the different methods of Intrusion Detection. 5 7. State and explain the different methods of checking activities are genuine 5 or not. 8. Explain with suitable example, how to overload extraction and insertion 5 operator 9. Explain Distributed Intrusion detection. 10. Explain trap Doors and Trojan Horses 8 11. Explain the Nature Of Viruses 6 12. How does a virus work and propagate 6* 13. Explain the different types of Viruses. 10 14. What is Macro viruses and why are they Threatening? 6* 15. Explain the Digital Immune System. 16. Explain the Antivirus Approaches. 10 17. Write a short note on Macro viruses 8 18. What are the four basic techniques of choosing passwords? Compare their relative merits. 19. What is a Virus? What are the typical stages it passes through in its lifetime? Suggest a suitable virus structure. 20. Explain the design principles of Firewall 8 21. Describe the firewall characteristics. 8 22. Explain the different types of firewalls. 8 23. Explain the different Firewall configurations 10 24. Explain the concept of Trusted systems. 10 25. Write a short note on trusted systems 8