Professional Documents
Culture Documents
(Autonomous)
Shamshabad - 501 218, Hyderabad
DEPARTMENT OF INFORMATION TECHNOLOGY
Regulations: VCE - R11 / VCE - R11A
B.Tech Information Technology VII Semester
COURSE DESCRIPTION
Course Code
Course Title
:
:
Course Structure
Course Coordinator
Team of Instructors
:
:
A1606
NETWORK SECURITY AND CRYPTOGRAPHY
Lectur
Tutorial Practica
Credits
es
s
ls
3
1
4
Mr. G.Venkatesh
Mr S.K.Pashanth, Mr. I.Srikanth
I.
Course Overview:
The growing importance of information systems, and their use to support safetycritical applications, has made information security a central issue for modern
systems. The course introduces the technical and policy foundations of information
security. The main objective of the course is to enable students to reason about
information systems from a security engineering perspective. Topics covered in the
course include elementary cryptography; access control; common software
vulnerabilities; common network vulnerabilities; digital rights management; policy
and export control law; privacy; management and assurance; and special topics in
information security. Hackers defense, attacks defense, systems and programs
security, network and web security, worms and viruses, and other Internet secure
applications.
II.
Prerequisite(s):
III.
Level
Credit
s
Periods /
Week
Prerequisites
UG
Marks Distribution:
Sessional Marks
University
End Exam
Marks
Total
Mark
s
75
100
IV.
Evaluation Scheme:
I Mid Term Examination
II Mid Term Examination
Online Objective Test
End Semester Examination
V.
Course Objectives:
I.
II.
III.
IV.
V.
VI.
VII.
VI.
20 marks
20 marks
5 marks
75 marks
Course Outcomes:
Upon completion of this course, students will be able to:
1.
Able to demonstrate and apply concept and principle of security Attacks,
Services and Mechanisms.
2.
Able to demonstrate existing Conventional encryption algorithms.
3.
Expertise in Message authentication, Hash function and Public key encryption.
4.
Able to applying Cryptographic algorithms in various real time applications.
5.
Able to Investigate and perform various security vulnerability tests.
6.
Able to understand impact of the security attacks in real time applications
7.
Understand the security vulnerabilities in existing Cryptograph algorithms and
network security protocols.
VII.
d
e
Lev Proficiency
el assessed by
N
--
--
Experiment
s
Experiment
s
Assignment
s, Exams
Lev Proficiency
el assessed by
Program Outcomes
between hardware and software (engineering problem
solving skills).
f An understanding of professional, legal, ethical, security and
social issues and responsibilities (professional integrity).
g An ability to communicate effectively in speech and in
writing, including documentation of hardware and software
systems (speaking / writing skills).
h Able to show the understanding of impact of engineering
solutions in a global on the society, economic, environmental
(engineering impact assessment skills).
i Demonstrate an ability to acquire new knowledge in the
computing discipline and to engage in life-long learning
(continuing education awareness).
j Knowledge of contemporary issues in the social sciences and
the humanities using computational tools (social awareness).
k An ability to use the techniques, skills, and modern
engineering tools necessary for computer engineering
practice (practical engineering analysis skills).
l An ability to apply engineering and management knowledge
and techniques to estimate time and resources needed to
complete a computer engineering project (engineering and
management skills).
m An ability to recognize the importance of professional
development by pursuing postgraduate studies or face
competitive examinations that offer challenging and
rewarding careers in computing (successful career and
immediate employment).
N = None
VIII.
S = Supportive
--
--
--
H
N
Assignment
s, Tutorials,
Exams
--
Lab, Exams
--
--
H = Highly Related
Syllabus:
UNIT - I
INTRODUCTION: Security trends, The OSI Security Architecture, Security Attacks,
Security Services and Security Mechanisms, A model for Network security.
CLASSICAL ENCRYPTION TECHNIQUES: Symmetric Cipher Modes, Substitute
Techniques, Transposition Techniques, Rotor Machines, Stenography.
UNIT - II
BLOCK CIPHER AND DATA ENCRYPTION STANDARDS: Block Cipher Principles,
Data Encryption Standards, the Strength of DES, Differential and Linear Crypt
Analysis, Block Cipher Design Principles.
ADVANCED ENCRYPTION STANDARDS: Evaluation Criteria for AES, the AES Cipher.
MORE ON SYMMETRIC CIPHERS: Multiple Encryption, Triple DES, Block Cipher
Modes of Operation, Stream Cipher and RC4.
INTRODUCTION TO NUMBER THEORY: Prime Numbers, Fermats and Eulers
Theorem, Testing for Primality, The Chinese Remainder Theorem, Discrete logarithms,
UNIT - III
PUBLIC KEY CRYPTOGRAPHY AND RSA: Principles Public key crypto Systems the
RSA algorithm, Key Management, Diffie Hellman Key Exchange, Elliptic Curve
Arithmetic, Elliptic Curve Cryptography.
MESSAGE
AUTHENTICATION
AND
HASH
FUNCTIONS:
Authentication
Requirement, Authentication Function, Message Authentication Code, Hash Function,
Security of Hash Function and MACs.
HASH AND MAC ALGORITHM: Secure Hash Algorithm, Whirlpool, HMAC, CMAC.
DIGITAL SIGNATURE: Digital Signature, Authentication Protocol, Digital Signature
Standard.
UNIT - IV
AUTHENTICATION APPLICATION: Kerberos, X.509 Authentication Service, Public
Key Infrastructure.
EMAIL SECURITY: Pretty Good Privacy (PGP) and S/MIME.
IP SECURITY: Overview, IP Security Architecture, Authentication Header,
Encapsulating Security Payload, Combining Security Associations and Key
Management.
UNIT - V
WEB SECURITY: Requirements, Secure Socket Layer (SSL) and Transport Layer
Security (TLS), Secure Electronic Transaction (SET), Intruders, Viruses and related
threats.
FIREWALL: Firewall Design principles, Trusted Systems.
IX.
X.
Course Plan:
Lectur
Referenc
Learning Objectives
Topics to be covered
e No.
e
1-4 Security attacks,
INTRODUCTION: Security trends, The OSI
T1: 1.1,
Mechanisms and
Security Architecture, Security Attacks,
R1: 1.1
Services
Security Services and Security
Mechanisms
5
Network Security
A model for Network security
T1: 1.2Architecture
1.4
6-7 Basic of Symmetric
CLASSICAL ENCRYPTION TECHNIQUES:
T1: 1.5cryptography
Symmetric Cipher Modes, Substitute
1.9
Techniques, Transposition Techniques,
Rotor Machines
7-8 Introduction
Stenography
R1: 2.2stenography
2.4
9-10 Basic Symmetric
BLOCK CIPHER AND DATA ENCRYPTION
T1:
encryption and it
STANDARDS: Block Cipher Principles, Data 2.5,2.6
vulnerabilities
Encryption Standards, the Strength of
DES, Differential and Linear Crypt
Analysis, Block Cipher Design Principles
11-12 Implementation of AES ADVANCED ENCRYPTION STANDARDS:
T1: 2.7
Evaluation Criteria for AES, the AES
Cipher.
Lectur
Referenc
Learning Objectives
Topics to be covered
e No.
e
12-13 Advanced Symmetric
MORE ON SYMMETRIC CIPHERS: Multiple
T1: 2.8
Encryption
Encryption, Triple DES, Block Cipher
Modes of Operation, Stream Cipher and
RC4.
14-16 Basic Number theory
INTRODUCTION TO NUMBER THEORY:
T2: 5.2algorithms
Prime Numbers, Fermats and Eulers
5.8
Theorem, Testing for Primality, The
Chinese Remainder Theorem, Discrete
logarithms,
17-20 Asymmetric key
PUBLIC KEY CRYPTOGRAPHY AND RSA:
T1:
encryption
Principles Public key crypto Systems the
3.5,3.6
RSA algorithm, Key Management, Diffie
Hellman Key Exchange, Elliptic Curve
Arithmetic, Elliptic Curve Cryptography.
21-22 Integrity Mechanisms
MESSAGE AUTHENTICATION AND HASH
T1: 3.7FUNCTIONS: Authentication Requirement,
3.9
Authentication Function, Message
Authentication Code, Hash Function,
Security of Hash Function and MACs.
23-24 Advance integrity
HASH AND MAC ALGORITHM: Secure Hash T1: 3.10
mechanisms
Algorithm, Whirlpool, HMAC, CMAC.
25-27 Authentication
DIGITAL SIGNATURE: Digital Signature,
T1:
Mechanisms
Authentication Protocol, Digital Signature
4.1,4.2
Standard.
28-30 Distributed
AUTHENTICATION APPLICATION: Kerberos,
T1:
Authentication
X.509 Authentication Service, Public Key
4.3,4.4
Mechanisms
Infrastructure.
30-33 E-mail Security
EMAIL SECURITY: Pretty Good Privacy
T1: 5.1(PGP) and S/MIME.
5.4
34-39 IP Security
IP SECURITY: Overview, IP Security
T1: 5.5
Architecture, Authentication Header,
Encapsulating Security Payload,
Combining Security Associations and Key
Management.
40-47 Web Security principles WEB SECURITY: Requirements, Secure
T1:5.7
Socket Layer (SSL) and Transport Layer
Security (TLS), Secure Electronic
Transaction (SET), Intruders, Viruses and
related threats.
48-54 Firewall design and
FIREWALL: Firewall Design principles,
T1:
types
Trusted Systems.
6.1,6.2
XI.
Mapping course objectives leading to the achievement of the program
outcomes:
Course
Objecti
ves
I
II
Program Outcomes
a
H
H
III
IV
S
H
VI
VII
S = Supportive
H = Highly Related
XII. Mapping course outcomes leading to the achievement of the program
outcomes:
Course
Outcom
es
Program Outcomes
a
3
4
5
6
S
H
i
S
S
S
k
H
H
S
S
H
S = Supportive
Prepared By
Date
:
Mr. . G.Venkatesh
25 January, 2013
H = Highly Related