Name of chapter & details.

Similar documents
10EC832: NETWORK SECURITY

Cryptography and Network Security

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

SRI VENKATESWARA COLLEGE OF ENGINEERING

Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank

Chapter 2: Classical Encryption Techniques

Introduction to information Security

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Department of Computer Science and Engineering NITK, Surathkal IS703 - Network Security [M. Tech-ISE] (Syllabus and Assessment Plan)

KALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER COURSE PLAN

Introduction and Overview. Why CSCI 454/554?

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

SUMMARY OF INFORMATION ON EACH COURSE

CSCE 715: Network Systems Security

Chapter 8. Network Security. Need for Security. An Introduction to Cryptography. Transposition Ciphers One-Time Pads

Academic Course Description

The University of Jordan. Accreditation & Quality Assurance Center. COURSE Syllabus

06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous)

INSTITUTE OF AERONAUTICAL ENGINEERING Dundigal, Hyderabad

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

M.D UNIVERSITY SCHEME OF STUDIES AND EXAMINATION M.TECH 2nd YEAR (COMPUTER SCIENCE & ENGINEERING) SEMESTER 3rd CBCS Scheme effective from

Cryptography and Network Security

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

Cryptography Symmetric Cryptography Asymmetric Cryptography Internet Communication. Telling Secrets. Secret Writing Through the Ages.

An Adaptive Play fair Cipher Algorithm for Secure Communication Using Radix 64 Conversion

MLR Institute of Technology

14. Internet Security (J. Kurose)

APNIC elearning: Cryptography Basics

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

KALASALINGAM UNIVERSITY

CRYPTOGRAPHY AND NETWORK SECURITY

Faculty of Science & Information Technology

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

Overview of Conventional Encryption Techniques

L13. Reviews. Rocky K. C. Chang, April 10, 2015

For Tricia: never dull, never boring, the smartest and bravest person I know

Fall 2017 CIS 3362 Final Exam. Last Name: First Name: 1) (10 pts) Decrypt the following ciphertext that was encrypted using the shift cipher:

Introduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview

CIS 3362 Final Exam 12/4/2013. Name:

Chapter 8 Security. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Internet and Intranet Protocols and Applications

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Network Security Chapter 8

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

Kurose & Ross, Chapters (5 th ed.)

Cryptographic Concepts

Encryption 2. Tom Chothia Computer Security: Lecture 3

A & B Section. Day. A Mrs. Krishnaveni S 1204 UB

Cryptography and secure channel. May 17, Networks and Security. Thibault Debatty. Outline. Cryptography. Public-key encryption

Networks and Communications MS216 - Course Outline -

Classical Encryption Techniques. CSS 322 Security and Cryptography

Ref:

Public Key Cryptography, OpenPGP, and Enigmail. 31/5/ Geek Girls Carrffots GVA

Hardware Design and Software Simulation for Four Classical Cryptosystems

Network Security. Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose, Keith Ross Addison-Wesley, July 2002.

Chapter 8 Network Security

BCA III Network security and Cryptography Examination-2016 Model Paper 1

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

Enhanced Play Fair Cipher

COMM1003. Information Theory. Dr. Wassim Alexan Spring Lecture 4

Classical Encryption Techniques

Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II

CIS 3362 Final Exam. Date: 12/9/2015. Name:

CSC/ECE 774 Advanced Network Security

PART I Symmetric Ciphers

Channel Coding and Cryptography Part II: Introduction to Cryptography

Network Security. Chapter 8. MYcsvtu Notes.

CS 332 Computer Networks Security

Exploring Cryptography Using CrypTool

Computer Security. 08r. Pre-exam 2 Last-minute Review Cryptography. Paul Krzyzanowski. Rutgers University. Spring 2018

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

Cryptography Introduction

Hybrid Public Key Cryptosystem Combining RSA & DES Algorithms

ECE 646 Cryptography and Computer Network Security. Course web page: Kris Gaj Research and teaching interests: Contact: ECE web page Courses ECE 646

CSC 774 Network Security

Cryptography (Overview)

Kris Gaj Research and teaching interests: ECE 646 Cryptography and Computer Network Security. Course web page: Contact: ECE 646

ENCRYPTION USING LESTER HILL CIPHER ALGORITHM

Cryptography MIS

(2½ hours) Total Marks: 75

City University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester B 2017/18

Topics. Number Theory Review. Public Key Cryptography

PESIT SOUTH CAMPUS 10IS835: INFORMATION AND NETWORK SECURITY. Faculty Name: Aisha Begam No. of Hours: 52

Encryption. INST 346, Section 0201 April 3, 2018

Department of Computer Science and Engineering. CSE 3482 Introduction to Computer Security. Instructor: N. Vlajic Date: Mar 1, 2017

Cryptography and Network Security Chapter 16. Fourth Edition by William Stallings

Diversified Caesar Cipher for Impeccable Security

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography

18733: Applied Cryptography Anupam Datta (CMU) Basic key exchange. Dan Boneh

Computer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018

Cryptography Introduction to Computer Security. Chapter 8

Foreword Preface About the Author Aperitifs The Lexicon of Cryptography Cryptographic Systems Cryptanalysis Side Information Thomas Jefferson and the

CSC 8560 Computer Networks: Network Security

Introduction to Cryptology ENEE 459E/CMSC 498R. Lecture 1 1/26/2017

GOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Department of Computer Science and Engineering COURSE PLAN

Other Topics in Cryptography. Truong Tuan Anh

ח'/סיון/תשע "א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms

CCNA Security 1.1 Instructional Resource

Computer Networking. What is network security? Chapter 7: Network security. Symmetric key cryptography. The language of cryptography

Transcription:

Course Title Course Code Information Security IT707 Theory : 03 Course Credit Practical : 01 Tutorial : 00 Course Learning Outcomes Credits : 04 On the completion of the course, students will be able to: Understand basic security concepts and applications. Understand and apply classical and modern encryption techniques to provide security. Understand basic web security principles. Identify and Investigatesystem threats. Understand and apply various authentication applications for security. Understand basic principles of wireless network security. Understand how authentication is implemented in wireless system. Understand and implement important network security tools and mechanisms. Sr. No. 1 2 3 Name of chapter & details. Section I Introduction: Security Attacks, Security services, Security Mechanisms, A Model for Network Security, Substitution Techniques, Transposition Techniques. Symmetric Key Ciphers: Symmetric Key Ciphers, Modern Block Ciphers (DES), Modern Block Cipher (AES). Public Key Cryptography: Principles of Public key cryptography, RSA Algorithm, Key Management, Elliptic Curve Cryptography, Diffie-Hellman key Exchange. Hours Allotted 05 07 07 4 Message Authentication and Hash Functions: Authentication, Requirement, functions, Message Authentication code, Hash Functions, Security of Hash Functions and Macs, MD5 Message Digest Algorithm, Secure Hash Algorithm 05

6 7 8 9 Section II Systems Threats and Risks: Viruses and related threats, Specific attacks: Sniffing and spoofing, Phishing, Pharming, Key Logger. Attacks on Virtualized Systems, What is Virtualized Systems? Attacks on Virtual systems. Network Security: Digital Signatures, Authentication Protocols, Digital Signature Standards, Application Authentication Techniques Like Kerberos, X.509 Directory Authentication Services, Active Directory Service of Windows NT/Windows 2000 IP Security E-mail Security: IP Security Overview, Architecture, Authentication Header, Encapsulation Security payload, Combining Security Association, Key Management, Pretty Good Privacy Web Security: Web Security Requirement, SSL, Secure Electronic Transaction. 04 08 08 04

Instructional Method and Pedagogy Lectures will be conducted using Multimedia software, and black-board. Various simulators will be used inside the class-room. Assessment will be done to monitor continuous student progress Computer network security tools will be used to understand various concepts of computer networks & security. Reference Books William Stallings, Cryptography and Network Security, Pearson, 4 th edition. Mark Ciampa,Security + Guide to Network Security Fundamentals, Cengage Learning, 4 th edition. Atul Kahate, Cryptography and Network Security, Tata MacGrew Hill, 3 rd Edition B. Forouzan, Cryptography and Network Security, Tata MacGrew Hill, 2 nd Edition D. Denning, Cryptography and Data Security, Addison Wesley, 2 nd edition. S Bueert and Stephen Paine, RSA securities official Guide to cryptography, McGraw Hill, 1 st edition. Uyless Black, Internet Security Protocols,Pearson Education, 2 nd edition. W.R. Cheswick, S.M. Bellovin, Firewalls and Internet Security, Addison Wesley, 1998, 2 nd edition. Additional Resources NPTEL video lectures of Cryptography and Network Security course of Computer Science and Engineering by Dr. Debdeep Mukhopadhyay, IIT Kharagpur. NPTEL video lectures of Computer Security and Cryptography I course of Computer Science and Engineering by Prof. Bernard Menezes, IIT Bombay.

List of Experiments Tutorial-1 1. Develop an application to implement Caesar cipher. You have to take variable length string as plaintext and integer value between 1 to 25 as key. Cipher text will be generated by taking one character of plain text at a time by using following formula: C = (p + k) mod (26) where c=cipher text and p=plain text. Students need to develop the same using C programming language. 2. Implement an application to implement Single columnar cipher. You have to take variable length string as plaintext and order of columns as key. Plain text will be arranged in matrix of m * n. where m=length(plain Text)/length(column) and n=length(column) Matrix will be read in order of the column as given per key. Students need to implement the same using C programming language. Tutorial-2 1. Develop an application to implement mono alphabetic cipher.

You have to take variable length string as plaintext and random key of exact 26 alphabets long. Take one character from plain text and search index of it from abcdefghijklmnopqrstuvwxyz. Locate the character in key which is there on the above found index. Replace that character with newly found character. Students need to develop the same using C programming language. 2. Develop an application to implement Rail fence cipher. You have to take variable length string as plaintext. Make matrix of 2 rows and (length (plaintext)/2) columns. Put each and every alternate character of plain text in matrix Read the matrix row wise to generate cipher text. Students need to develop the same using C programming language. Tutorial -3 Implement an application to implement Play Fair Cipher. You have to take variable length string as plaintext and variable length key. Make 5 * 5 MATRIX FROM THE KEY using : o fill in letters of key (without duplicates) o fill rest of matrix with other letters Make pair of two letters of plain text. if a pair is a repeated letter, insert a filler like 'X', eg. "balloon" encrypts as "ba lx lo on" Follow the encryption rules and generate the cipher text: o if both letters fall in the same row, replace each with letter to right (wrapping back to start from end), eg. ar" encrypts as "RM" o if both letters fall in the same column, replace each with the letter below it (again wrapping to top from bottom), eg. mu" encrypts to "CM" o otherwise each letter is replaced by the one in its row in the column of the other letter of the pair, eg. hs" encrypts to "BP", and ea" to "IM" or "JM" (as desired) Students need to develop the same using C programming language. Tutorial-4 Implement anapplication to implement Diffie Hellman Key Exchange algorithm. Guidelines to Generate keys using Diffie Hellman

You have to select two large prime numbers that are integer first. Now you have to assume two users Alice and Bob and calculate the value of A and B from A and B calculate the value of K1 and K2. Tutorial-5 Find algorithms for checking largest prime numbers and use this algorithm to develop an application to implement RSA algorithm. In your answer you have to implement logic to search largest prime numbers. You have to search or develop logic for checking largest prime numbers. You will be using this logic to develop the program for RSA algorithm. Tutorial 6 Perform an experiment to demonstrate how to sniff for network traffic. Guidelines Inside this lab you will download any packet sniffing tool. Download that tool and install the tool and try to capture the packets using the tool. Analyse the packet and note the analysis of the packet that you have captured. Tutorial-7 Analyze and demonstrate one Security Tools or Esthetical Hacking tool. Guidelines In your answer you have to select one esthetical hacking or security tool that you have not selected in previous tutorials. You have to download the tool and install the tool. You have to identify the purpose of the tool and try to use the tool. Prepare a presentation or demonstration of the tool and give the demonstration of the tool that you have selected.