Professional Documents
Culture Documents
: LP-01
Issue No. : 01
Issue Date : 05.05.2006
EASWARI ENGINEERING COLLEGE
Department of Computer Science and Engineering
Lesson Plan
Subject code: IT2352
Degree/Branch: B.E/CSE
Sl.No
TOPIC
No.of
Periods
10
Reference
Books
Page Nos
Objective:To understand the basic concepts of network security and number theory
1
2
3
4
5
6
7
8
9
10
1
1
1
1
1
1
1
1
1
T2
T2
T2
T1
T1
T1
T1
T1
T1
Hand outs
9-12
13-19
30-50
41-42
63-69,43-49
70-77
78-79
79-92
93-103
10
Simple DES
Differential cryptoanalysis
DES Algorithm
DES Modes of operation
Triple DES
AES Algorithm
RSA Algorithm
RSA Attacks
Primality test,Factoring
Cyber security investigation game
UNIT III PUBLIC KEY CRYPTOSYSTEMS
1
1
1
1
1
1
1
1
1
T2
T2
T2
T2
T2
T2
T2
T2
T2
64-71
83-85
72-82
181-188
178-180
135-140
257-274
275-280
242-244
www.infosecuregroup.com
10
1
1
1
1
1
1
1
1
1
T1
T1
T1
T1
T1
T1
T1
T1
T1
www.networkworld.com
201-208
210-212
212-214
218-222
224-228
229-231
244-245
245-246
246-251
10
Authentication applications,Kerberos
X.509,PKI
Electronic Mail Security-PGP
S/MIME
IP Security
IP Security
Web security
SSL,TLS
SET
IT Security issues
1
T2
1
T2
1
T2
1
T2
1
T2
1
T2
1
T2
1
T2
1
T2
www.networkworld.com
400-418
419-429
436-456
457-467
467-472
483-503
527-530
531-548
548-558
10
System security
Intruders
Password management
Malicious Software
Viruses
Viruses Counter measures
Firewalls design principles
Trusted systems
Security Standards
IT security news
1
1
1
1
1
1
1
1
1
T2
563-565
T2
565-581
T2
582-590
T2
598-599
T2
599-609
T2
610-613
T2
621-633
T2
634-638
T2
647-652
www.computerworld.com
TEXT BOOK
1.Wade Trappe,Lawrence C Washington,"Introduction to Crytography with coding theory",2nd ed,Person,2007.
2.William Stallings,"Cryptography and Network security Principles and Practices",Pearson/PHI,4th ed,2006.
REFERENCES
Prepared By:
S.Kayalvizhi)
(S.Mithra)
Approved By:
HOD/CSE