DOC/LP/01/28.02.02 LP-CS9259 LESSON PLAN LP: Rev. No: 00 Date: 12/07/2012 Sub Code & Name : CS9259 - NETWORK SECURITY Unit : I Branch : CS Page 1 of 6 Semester : VII UNIT I INTRODUCTION 9 Attacks - Services - Mechanisms - Conventional Encryption - Classical And Modern Techniques Encryption Algorithms - Confidentiality. Objective: To give an overview of Cryptography and its applications, to cover some of the older cryptosystems primarily used before the advent of the computers Session No 1 2 3 4 5 6 7 8 9 10 11 12 13 Topics to be covered Time in min Security trends – Attacks, Services and 50 Security Mechanism Conventional Encryption – Symmetric Cipher 50 model Classical crypto systems – Substitution cipher, 50 Shift cipher, Affine cipher, Vigenere Cipher and Playfair cipher Classical crypto systems – Hill Cipher, 50 Transposition ciphers, Steganography Encryption Algorithms - DES 50 DES - Differential and Linear Cryptanalysis 50 DES – Block cipher modes of operation 50 AES Cipher - Structure 50 AES – Key expansion 50 Contemporary Symmetric Ciphers - Triple 50 DES, BlowFish Contemporary Symmetric Ciphers – RC5, RC4 50 Stream cipher Confidentiality using Symmetric encryption 50 Review 50 Ref T1,R1, R3 T1 Teaching Method BB/LCD BB/LCD T1,R2, R3 BB/ LCD T1,R2, R3 T1 T1 T1 T1 T1 T1 BB BB/LCD BB/LCD BB/LCD BB/LCD BB/LCD BB/LCD T1 BB T1 T1,R2, R3 BB BB/LCD DOC/LP/01/28.02.02 LP-CS9259 LESSON PLAN Sub Code & Name : CS9259 – NETWORK SECURITY Unit : II Branch : CS Semester : VII LP: Rev. No: 00 Date: 12/07/2012 Page 2 of 6 UNIT II PUBLIC KEY ENCRYPTION RSA - Elliptic Curve Cryptography - Number Theory Concepts 9 Objective: To learn about various encryption algorithms and the number theory concepts Session No 14 15 16 17 18 19 20 21 22 23,24 Topics to be covered Number Theory Concepts – Prime numbers, Fermat’s and Euler’s theorems, Testing for primality Number Theory Concepts – Chinese Remainder theorem Number Theory Concepts – Discrete logarithms Number Theory Concepts – Finite fields Principles of public key cryptosystems RSA – Description of algorithm, Attacks on RSA RSA – Primality testing, Factoring and Security Elliptic Curve Cryptography Review CAT I Time In min 50 Ref T1 Teaching Method BB/LCD 50 T1 BB/LCD 50 T1 BB/LCD 50 50 50 T1 T1 T1 BB/LCD BB/LCD BB/LCD 50 T1 BB/LCD 50 50 75 T1 T1 BB/LCD BB/LCD DOC/LP/01/28.02.02 LP-CS9259 LESSON PLAN LP: Rev. No: 00 Sub Code & Name : CS9259 – NETWORK SECURITY Unit : III Branch : CS Date: 12/07/2012 Semester : VII Page 3 of 6 UNIT III MESSAGE AUTHENTICATION 9 Hash Functions - Digest Functions - Digital Signatures - Authentication Protocols. . Objective: To study the use of message authentication codes and hash functions, as well as digital signatures and authentication protocols Session No 25 26 27 28 29 30 31 32 33 34 35 36 37 Topics to be covered Authentication requirements and functions Message Authentication Code – Requirements and MAC based on DES Hash functions – Requirements and Simple Hash functions Hash Algorithm - Birthday attacks Hash Algorithm – Block chaining techniques Security of Hash functions and MACs Hash algorithms - MD5 Message Digest Algorithm Hash algorithms Secure Hash algorithm RIPEMD 160, HMAC Digital Signatures – Requirements and its types Authentication Protocols – Mutual and Oneway Authentication Digital Signatures Standard – DSS approach and Digital Signature algorithm Review Time In min 50 50 Ref T1 T1 Teaching Method BB BB 50 T1 BB 50 50 50 50 T1 T1 T1 T1 BB BB BB BB/LCD 50 50 50 T1 T1 T1 BB/LCD BB/LCD BB/LCD 50 T1 BB/LCD 50 T1 BB 50 T1 BB/LCD DOC/LP/01/28.02.02 LP-CS9259 LESSON PLAN LP: Rev. No: 00 Sub Code & Name : CS9259 – NETWORK SECURITY Unit : IV Branch : CS Date: 12/07/2012 Semester : VII Page 4 UNIT IV NETWORK SECURITY PRACTICE Authentication, Applications - Electronic Mail Security - IP Security - Web Security. . of 6 9 Objective: To cover important network security tools and applications Session No 38 39 40 41 42 43 44 45 46 47 48 49,50 Topics to be covered Time in min – 50 Authentication applications – Kerberos Motivation, Kerberos Version 4 and 5 Authentication applications X.509 Authentication service Authentication applications – Public key infrastructure – PKIX Management functions and protocols Electronic Mail security – Pretty Good Privacy (PGP) – Notation, Operational Description, Cryptographic keys and key rings, Public key management Electronic Mail security S/MIME – Multipurpose Internet Mail Extensions, S/MIME functionality, Messages, Certificate processing and enhanced security services IP security - Overview, Architecture, Authentication header IP security - Encapsulating security payload, Combining security associations, Key management Web Security – Web Security Considerations – Threats, Web traffic security approaches Web Security – Secure Socket Layer and Transport Layer Security – Architecture, SSL Record Protocol, Change Cipher Spec Protocol, Alert protocol Web Security – Secure Socket Layer and Transport Layer Security – Handshake protocol Cryptographic Computations and transport layer security Secure Electronic Transaction – Overview, Dual signature and payment processing & Review CAT II T1 Teaching Method BB 50 T1 BB 50 T1 BB 50 T1,R2 BB 50 T1,R2 BB/OHP 50 T1,R2 BB 50 T1,R2 BB 50 T1,R2 BB 50 T1,R2 BB 50 T1,R2 BB/OHP 50 T1,R2 BB/OHP 75 Ref DOC/LP/01/28.02.02 LP-CS9259 LESSON PLAN LP: Rev. No: 00 Sub Code & Name : CS9259 – NETWORK SECURITY Unit : V Branch : CS Date: 12/07/2012 Semester : VII Page UNIT V SYSTEM SECURITY Intruders – Viruses – Worms – Firewalls Design Principles – Trusted Systems. 5 of 6 9 Objective: To learn about system-level security issues, including the threat of and countermeasures for intruders and viruses, and the use of firewalls and trusted systems Session No 51 52 53 54 55 56 57 58 59,60 Topics to be covered System security - Intruders – Intrusion detection, Password management System security - Malicious software – Virus and related threats System security - Malicious software - Virus countermeasures System security - Malicious software System security - Distributed Denial of Service Attacks System security - Firewalls – Design principles System security -- Trusted systems Review CAT III Time In min 50 Ref T1,R3 Teaching Method BB/OHP 50 T1,R3 BB/OHP 50 T1,R3 BB 50 50 T1 T1 BB BB 50 50 50 75 T1,R3 T1,R3 T1,R3 BB BB BB DOC/LP/01/28.02.02 LP-CS9259 LESSON PLAN LP: Rev. No: 00 Sub Code & Name : CS9259 – NETWORK SECURITY Branch : CS Date: 12/07/2012 Semester : VII Page 6 of 6 Course Delivery Plan Week 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 I II I II I II I II I II I II I II I II I II I II I II I II I II I II I II Units 1 2 3 4 5 BOOKS FOR STUDY: TEXT BOOK: 1. Stallings, Cryptography & Network Security - Principles & Practice, Prentice Hall, 3rd Edition, 2002. REFERENCES: 1. Bruce, Schneier, Applied Cryptography, 2nd Edition, Toha Wiley & Sons, 1996. 2. Man Young Rhee, “Internet Security”, Wiley, 2003. 3. Pfleeger & Pfleeger, “Security in Computing”, Pearson Education, 3rd Edition, 2003. Prepared by Approved by Signature Name Ms.R.Jayabhaduri Dr. T. K Thivakaran Designation Assistant Professor/CS HOD, Department of CS Date 12/07/2012 12/07/2012
© Copyright 2026 Paperzz