You are on page 1of 6

VARDHAMAN COLLEGE OF ENGINEERING

(Autonomous)
Shamshabad - 501 218, Hyderabad
DEPARTMENT OF INFORMATION TECHNOLOGY
Regulations: VCE - R11 / VCE - R11A
B.Tech Information Technology VII Semester
COURSE DESCRIPTION
Course Code
Course Title

:
:

Course Structure

Course Coordinator
Team of Instructors

:
:

A1606
NETWORK SECURITY AND CRYPTOGRAPHY
Lectur
Tutorial Practica
Credits
es
s
ls
3
1
4
Mr. G.Venkatesh
Mr S.K.Pashanth, Mr. I.Srikanth

I.

Course Overview:
The growing importance of information systems, and their use to support safetycritical applications, has made information security a central issue for modern
systems. The course introduces the technical and policy foundations of information
security. The main objective of the course is to enable students to reason about
information systems from a security engineering perspective. Topics covered in the
course include elementary cryptography; access control; common software
vulnerabilities; common network vulnerabilities; digital rights management; policy
and export control law; privacy; management and assurance; and special topics in
information security. Hackers defense, attacks defense, systems and programs
security, network and web security, worms and viruses, and other Internet secure
applications.

II.

Prerequisite(s):

III.

Level

Credit
s

Periods /
Week

Prerequisites

UG

Data Communicating, Computer Networks and


Mathematics

Marks Distribution:
Sessional Marks

University
End Exam
Marks

Total
Mark
s

Mid Semester Test


There will be two Mid Semester Tests in theory courses having
a weightage of 20 marks to be answered in two hours duration
each. Marks shall be awarded considering the average of two
Mid Semester Tests in each course. In case a student does not
appear in the Mid Semester Tests due to any reason
whatsoever, will get zero marks(s).
Objective Test
There will be one Objective Test in theory courses for a
maximum of 5 marks to be answered in 20 Minutes duration.
In case a student does not appear in the Objective Test due to
any reason whatsoever, will get zero marks(s).

75

100

IV.

Evaluation Scheme:
I Mid Term Examination
II Mid Term Examination
Online Objective Test
End Semester Examination

V.

Course Objectives:
I.
II.
III.
IV.
V.
VI.
VII.

VI.

20 marks
20 marks
5 marks
75 marks

An ability to understand various security attacks and services


An ability to understand the conventional encryption algorithms
An ability to examine between Message authentication, Hash function and
Public-key encryption algorithms.
An ability to apply different types of message authentication methods
An ability to exhibit advanced protocols over the existing ones
An ability to Investigate IP security, Web security schemes with current and next
generation schemes.
Exploring different types security worms, virus and logic bomb creation and
practicing techniques.

Course Outcomes:
Upon completion of this course, students will be able to:
1.
Able to demonstrate and apply concept and principle of security Attacks,
Services and Mechanisms.
2.
Able to demonstrate existing Conventional encryption algorithms.
3.
Expertise in Message authentication, Hash function and Public key encryption.
4.
Able to applying Cryptographic algorithms in various real time applications.
5.
Able to Investigate and perform various security vulnerability tests.
6.
Able to understand impact of the security attacks in real time applications
7.
Understand the security vulnerabilities in existing Cryptograph algorithms and
network security protocols.

VII.

How Course Outcomes are assessed:


Program Outcomes
a

d
e

An ability to apply knowledge of mathematics, including


discrete mathematics, probability, statistics, science,
computer science and engineering, electronic engineering
and electrical engineering as it applies to computer
hardware and software (fundamental engineering analysis
skills).
An ability to design and conduct experiments, as well as to
organize, analyze and interpret data to produce meaningful
conclusions and recommendations (information retrieval
skills).
An ability to design and conduct experiments, as well as to
organize, analyze and interpret data to produce meaningful
conclusions and recommendations (information retrieval
skills).
An ability to work individually or as a member with
responsibility to function on multi-disciplinary teams
(teamwork).
An ability to identify, formulate, and solve hardware and
software computing problems, accounting for the interaction

Lev Proficiency
el assessed by
N
--

--

Experiment
s

Experiment
s

Assignment
s, Exams

Lev Proficiency
el assessed by

Program Outcomes
between hardware and software (engineering problem
solving skills).
f An understanding of professional, legal, ethical, security and
social issues and responsibilities (professional integrity).
g An ability to communicate effectively in speech and in
writing, including documentation of hardware and software
systems (speaking / writing skills).
h Able to show the understanding of impact of engineering
solutions in a global on the society, economic, environmental
(engineering impact assessment skills).
i Demonstrate an ability to acquire new knowledge in the
computing discipline and to engage in life-long learning
(continuing education awareness).
j Knowledge of contemporary issues in the social sciences and
the humanities using computational tools (social awareness).
k An ability to use the techniques, skills, and modern
engineering tools necessary for computer engineering
practice (practical engineering analysis skills).
l An ability to apply engineering and management knowledge
and techniques to estimate time and resources needed to
complete a computer engineering project (engineering and
management skills).
m An ability to recognize the importance of professional
development by pursuing postgraduate studies or face
competitive examinations that offer challenging and
rewarding careers in computing (successful career and
immediate employment).
N = None
VIII.

S = Supportive

--

--

--

H
N

Assignment
s, Tutorials,
Exams
--

Lab, Exams

--

--

H = Highly Related

Syllabus:
UNIT - I
INTRODUCTION: Security trends, The OSI Security Architecture, Security Attacks,
Security Services and Security Mechanisms, A model for Network security.
CLASSICAL ENCRYPTION TECHNIQUES: Symmetric Cipher Modes, Substitute
Techniques, Transposition Techniques, Rotor Machines, Stenography.
UNIT - II
BLOCK CIPHER AND DATA ENCRYPTION STANDARDS: Block Cipher Principles,
Data Encryption Standards, the Strength of DES, Differential and Linear Crypt
Analysis, Block Cipher Design Principles.
ADVANCED ENCRYPTION STANDARDS: Evaluation Criteria for AES, the AES Cipher.
MORE ON SYMMETRIC CIPHERS: Multiple Encryption, Triple DES, Block Cipher
Modes of Operation, Stream Cipher and RC4.
INTRODUCTION TO NUMBER THEORY: Prime Numbers, Fermats and Eulers
Theorem, Testing for Primality, The Chinese Remainder Theorem, Discrete logarithms,
UNIT - III
PUBLIC KEY CRYPTOGRAPHY AND RSA: Principles Public key crypto Systems the
RSA algorithm, Key Management, Diffie Hellman Key Exchange, Elliptic Curve
Arithmetic, Elliptic Curve Cryptography.
MESSAGE
AUTHENTICATION
AND
HASH
FUNCTIONS:
Authentication
Requirement, Authentication Function, Message Authentication Code, Hash Function,
Security of Hash Function and MACs.

HASH AND MAC ALGORITHM: Secure Hash Algorithm, Whirlpool, HMAC, CMAC.
DIGITAL SIGNATURE: Digital Signature, Authentication Protocol, Digital Signature
Standard.
UNIT - IV
AUTHENTICATION APPLICATION: Kerberos, X.509 Authentication Service, Public
Key Infrastructure.
EMAIL SECURITY: Pretty Good Privacy (PGP) and S/MIME.
IP SECURITY: Overview, IP Security Architecture, Authentication Header,
Encapsulating Security Payload, Combining Security Associations and Key
Management.
UNIT - V
WEB SECURITY: Requirements, Secure Socket Layer (SSL) and Transport Layer
Security (TLS), Secure Electronic Transaction (SET), Intruders, Viruses and related
threats.
FIREWALL: Firewall Design principles, Trusted Systems.
IX.

List of Text Books / References / Websites / Journals / Others


Text Books:
1. William Stallings (2006), Cryptography and Network Security: Principles and
Practice, 4th edition, Pearson Education, India.
2. William Stallings (2000), Network Security Essentials (Applications and Standards),
Pearson Education, India.
Reference Books:
1. Charlie Kaufman (2002), Network Security: Private Communication in a Public
World, 2nd edition, Prentice Hall of India, New Delhi.
2. AtulKahate (2008), Cryptography and Network Security, 2nd edition, Tata Mc Graw
Hill, India.
3. Robert Bragg, Mark Rhodes (2004), Network Security: The complete reference,
Tata Mc Graw Hill, India.

X.

Course Plan:
Lectur
Referenc
Learning Objectives
Topics to be covered
e No.
e
1-4 Security attacks,
INTRODUCTION: Security trends, The OSI
T1: 1.1,
Mechanisms and
Security Architecture, Security Attacks,
R1: 1.1
Services
Security Services and Security
Mechanisms
5
Network Security
A model for Network security
T1: 1.2Architecture
1.4
6-7 Basic of Symmetric
CLASSICAL ENCRYPTION TECHNIQUES:
T1: 1.5cryptography
Symmetric Cipher Modes, Substitute
1.9
Techniques, Transposition Techniques,
Rotor Machines
7-8 Introduction
Stenography
R1: 2.2stenography
2.4
9-10 Basic Symmetric
BLOCK CIPHER AND DATA ENCRYPTION
T1:
encryption and it
STANDARDS: Block Cipher Principles, Data 2.5,2.6
vulnerabilities
Encryption Standards, the Strength of
DES, Differential and Linear Crypt
Analysis, Block Cipher Design Principles
11-12 Implementation of AES ADVANCED ENCRYPTION STANDARDS:
T1: 2.7
Evaluation Criteria for AES, the AES
Cipher.

Lectur
Referenc
Learning Objectives
Topics to be covered
e No.
e
12-13 Advanced Symmetric
MORE ON SYMMETRIC CIPHERS: Multiple
T1: 2.8
Encryption
Encryption, Triple DES, Block Cipher
Modes of Operation, Stream Cipher and
RC4.
14-16 Basic Number theory
INTRODUCTION TO NUMBER THEORY:
T2: 5.2algorithms
Prime Numbers, Fermats and Eulers
5.8
Theorem, Testing for Primality, The
Chinese Remainder Theorem, Discrete
logarithms,
17-20 Asymmetric key
PUBLIC KEY CRYPTOGRAPHY AND RSA:
T1:
encryption
Principles Public key crypto Systems the
3.5,3.6
RSA algorithm, Key Management, Diffie
Hellman Key Exchange, Elliptic Curve
Arithmetic, Elliptic Curve Cryptography.
21-22 Integrity Mechanisms
MESSAGE AUTHENTICATION AND HASH
T1: 3.7FUNCTIONS: Authentication Requirement,
3.9
Authentication Function, Message
Authentication Code, Hash Function,
Security of Hash Function and MACs.
23-24 Advance integrity
HASH AND MAC ALGORITHM: Secure Hash T1: 3.10
mechanisms
Algorithm, Whirlpool, HMAC, CMAC.
25-27 Authentication
DIGITAL SIGNATURE: Digital Signature,
T1:
Mechanisms
Authentication Protocol, Digital Signature
4.1,4.2
Standard.
28-30 Distributed
AUTHENTICATION APPLICATION: Kerberos,
T1:
Authentication
X.509 Authentication Service, Public Key
4.3,4.4
Mechanisms
Infrastructure.
30-33 E-mail Security
EMAIL SECURITY: Pretty Good Privacy
T1: 5.1(PGP) and S/MIME.
5.4
34-39 IP Security
IP SECURITY: Overview, IP Security
T1: 5.5
Architecture, Authentication Header,
Encapsulating Security Payload,
Combining Security Associations and Key
Management.
40-47 Web Security principles WEB SECURITY: Requirements, Secure
T1:5.7
Socket Layer (SSL) and Transport Layer
Security (TLS), Secure Electronic
Transaction (SET), Intruders, Viruses and
related threats.
48-54 Firewall design and
FIREWALL: Firewall Design principles,
T1:
types
Trusted Systems.
6.1,6.2
XI.
Mapping course objectives leading to the achievement of the program
outcomes:
Course
Objecti
ves
I
II

Program Outcomes
a

H
H

III

IV

S
H

VI

VII

S = Supportive
H = Highly Related
XII. Mapping course outcomes leading to the achievement of the program
outcomes:
Course
Outcom
es

Program Outcomes
a

3
4
5
6

S
H

i
S

S
S

k
H
H
S
S

H
S = Supportive

Prepared By
Date

:
Mr. . G.Venkatesh
25 January, 2013

H = Highly Related

You might also like