You are on page 1of 2

Format No.

: LP-01
Issue No. : 01
Issue Date : 05.05.2006
EASWARI ENGINEERING COLLEGE
Department of Computer Science and Engineering
Lesson Plan
Subject code: IT2352

Degree/Branch: B.E/CSE

Subject Name: CRYPTOGRAPHY AND NETWORK SECURITY


Year/Sem/Sec: IV/VII/A&B
Faculty : Mrs.S.Kayalvizhi
Total No. of Hrs given in Syllabus:
Tutorial: 0
Lecture:45
Practical:0
Grand Total:45Hours

Sl.No

TOPIC

No.of
Periods

UNIT I INTRODUCTION TO NETWORK SECURITY

10

Reference
Books

Page Nos

Objective:To understand the basic concepts of network security and number theory
1
2
3
4
5
6
7
8
9
10

Introduction and Security Trends,OSI security Architecture


Attacks and Services and mechanisms
Classical crypto Systems
Different types of Ciphers
Basic Number Theory,LFSR Sequences
Congruences ,Chinese Remainder Theorem
Modular Exponentiation
Fermat and Euler's theorem ,Legendre and Jacobi symbols
Finite Fields ,Continued fractions
Steganography
UNIT II ENCRYCPTION ALGORITHMS

1
1
1
1
1
1
1
1
1

T2
T2
T2
T1
T1
T1
T1
T1
T1
Hand outs

9-12
13-19
30-50
41-42
63-69,43-49
70-77
78-79
79-92
93-103

10

Objective:To study the symmetric and Asymmetric encryption algorithm


11
12
13
14
15
16
17
18
19
20

Simple DES
Differential cryptoanalysis
DES Algorithm
DES Modes of operation
Triple DES
AES Algorithm
RSA Algorithm
RSA Attacks
Primality test,Factoring
Cyber security investigation game
UNIT III PUBLIC KEY CRYPTOSYSTEMS

1
1
1
1
1
1
1
1
1

T2
T2
T2
T2
T2
T2
T2
T2
T2

64-71
83-85
72-82
181-188
178-180
135-140
257-274
275-280
242-244

www.infosecuregroup.com

10

Objective:To study the public key algorithm


21
22
23
24
25
26
27
28
29
30

Discrete Logarithms,Computing discrete logs


Diffie-Hellman key exchange
EIGamal Public key cryptosystems
Hash functions
Secure Hash
Birthday attacks-MD5
Digital signature
RSA
EIGmal ,DSA
Security Awareness Application

1
1
1
1
1
1
1
1
1

T1
T1
T1
T1
T1
T1
T1
T1
T1
www.networkworld.com

201-208
210-212
212-214
218-222
224-228
229-231
244-245
245-246
246-251

UNIT IV NETWORK SECURITY APPLICATION

10

Obj:To study about security application


31
32
33
34
35
36
37
38
39
40

Authentication applications,Kerberos
X.509,PKI
Electronic Mail Security-PGP
S/MIME
IP Security
IP Security
Web security
SSL,TLS
SET
IT Security issues

1
T2
1
T2
1
T2
1
T2
1
T2
1
T2
1
T2
1
T2
1
T2
www.networkworld.com

UNIT V SYSTEM SECURITY

400-418
419-429
436-456
457-467
467-472
483-503
527-530
531-548
548-558

10

Obj:To study about system security


41
42
43
44
45
46
47
48
49
50

System security
Intruders
Password management
Malicious Software
Viruses
Viruses Counter measures
Firewalls design principles
Trusted systems
Security Standards
IT security news

1
1
1
1
1
1
1
1
1

T2
563-565
T2
565-581
T2
582-590
T2
598-599
T2
599-609
T2
610-613
T2
621-633
T2
634-638
T2
647-652
www.computerworld.com

TEXT BOOK
1.Wade Trappe,Lawrence C Washington,"Introduction to Crytography with coding theory",2nd ed,Person,2007.
2.William Stallings,"Cryptography and Network security Principles and Practices",Pearson/PHI,4th ed,2006.
REFERENCES

1.W.Mao,"Modern Cryptography-Theory and practice",Pearson Education,Second Edition,2007.


2.Charles P.Pfleeger,Shari Lawrence pfleeger-Security in Computing Third Edition-Prentice Hall of India,2006.

Prepared By:

S.Kayalvizhi)
(S.Mithra)

Approved By:

HOD/CSE

You might also like