DOC/LP/01/28

DOC/LP/01/28.02.02
LP-CS9259
LESSON PLAN
LP: Rev. No: 00
Date: 12/07/2012
Sub Code & Name : CS9259 - NETWORK SECURITY
Unit : I
Branch : CS
Page 1 of 6
Semester : VII
UNIT I INTRODUCTION
9
Attacks - Services - Mechanisms - Conventional Encryption - Classical And Modern Techniques
Encryption Algorithms - Confidentiality.
Objective: To give an overview of Cryptography and its applications, to cover some of the older
cryptosystems primarily used before the advent of the computers
Session
No
1
2
3
4
5
6
7
8
9
10
11
12
13
Topics to be covered
Time in
min
Security trends – Attacks, Services and
50
Security Mechanism
Conventional Encryption – Symmetric Cipher
50
model
Classical crypto systems – Substitution cipher,
50
Shift cipher, Affine cipher, Vigenere Cipher
and Playfair cipher
Classical crypto systems – Hill Cipher,
50
Transposition ciphers, Steganography
Encryption Algorithms - DES
50
DES - Differential and Linear Cryptanalysis
50
DES – Block cipher modes of operation
50
AES Cipher - Structure
50
AES – Key expansion
50
Contemporary Symmetric Ciphers - Triple
50
DES, BlowFish
Contemporary Symmetric Ciphers – RC5, RC4
50
Stream cipher
Confidentiality using Symmetric encryption
50
Review
50
Ref
T1,R1,
R3
T1
Teaching
Method
BB/LCD
BB/LCD
T1,R2,
R3
BB/ LCD
T1,R2,
R3
T1
T1
T1
T1
T1
T1
BB
BB/LCD
BB/LCD
BB/LCD
BB/LCD
BB/LCD
BB/LCD
T1
BB
T1
T1,R2,
R3
BB
BB/LCD
DOC/LP/01/28.02.02
LP-CS9259
LESSON PLAN
Sub Code & Name : CS9259 – NETWORK SECURITY
Unit : II
Branch : CS
Semester : VII
LP: Rev. No: 00
Date: 12/07/2012
Page
2
of 6
UNIT II PUBLIC KEY ENCRYPTION
RSA - Elliptic Curve Cryptography - Number Theory Concepts
9
Objective: To learn about various encryption algorithms and the number theory concepts
Session
No
14
15
16
17
18
19
20
21
22
23,24
Topics to be covered
Number Theory Concepts – Prime numbers,
Fermat’s and Euler’s theorems, Testing for
primality
Number Theory Concepts – Chinese
Remainder theorem
Number Theory Concepts – Discrete
logarithms
Number Theory Concepts – Finite fields
Principles of public key cryptosystems
RSA – Description of algorithm, Attacks on
RSA
RSA – Primality testing, Factoring and
Security
Elliptic Curve Cryptography
Review
CAT I
Time
In min
50
Ref
T1
Teaching
Method
BB/LCD
50
T1
BB/LCD
50
T1
BB/LCD
50
50
50
T1
T1
T1
BB/LCD
BB/LCD
BB/LCD
50
T1
BB/LCD
50
50
75
T1
T1
BB/LCD
BB/LCD
DOC/LP/01/28.02.02
LP-CS9259
LESSON PLAN
LP: Rev. No: 00
Sub Code & Name : CS9259 – NETWORK SECURITY
Unit : III
Branch : CS
Date: 12/07/2012
Semester : VII
Page
3
of 6
UNIT III MESSAGE AUTHENTICATION
9
Hash Functions - Digest Functions - Digital Signatures - Authentication Protocols.
.
Objective: To study the use of message authentication codes and hash functions, as well as
digital signatures and authentication protocols
Session
No
25
26
27
28
29
30
31
32
33
34
35
36
37
Topics to be covered
Authentication requirements and functions
Message Authentication Code – Requirements
and MAC based on DES
Hash functions – Requirements and Simple
Hash functions
Hash Algorithm - Birthday attacks
Hash Algorithm – Block chaining techniques
Security of Hash functions and MACs
Hash algorithms - MD5 Message Digest
Algorithm
Hash algorithms Secure Hash algorithm
RIPEMD 160, HMAC
Digital Signatures – Requirements and its
types
Authentication Protocols – Mutual and Oneway Authentication
Digital Signatures Standard – DSS approach
and Digital Signature algorithm
Review
Time
In min
50
50
Ref
T1
T1
Teaching
Method
BB
BB
50
T1
BB
50
50
50
50
T1
T1
T1
T1
BB
BB
BB
BB/LCD
50
50
50
T1
T1
T1
BB/LCD
BB/LCD
BB/LCD
50
T1
BB/LCD
50
T1
BB
50
T1
BB/LCD
DOC/LP/01/28.02.02
LP-CS9259
LESSON PLAN
LP: Rev. No: 00
Sub Code & Name : CS9259 – NETWORK SECURITY
Unit : IV
Branch : CS
Date: 12/07/2012
Semester : VII
Page
4
UNIT IV NETWORK SECURITY PRACTICE
Authentication, Applications - Electronic Mail Security - IP Security - Web Security.
.
of 6
9
Objective: To cover important network security tools and applications
Session
No
38
39
40
41
42
43
44
45
46
47
48
49,50
Topics to be covered
Time in
min
–
50
Authentication applications – Kerberos
Motivation, Kerberos Version 4 and 5
Authentication
applications
X.509
Authentication service
Authentication applications – Public key
infrastructure – PKIX Management functions and
protocols
Electronic Mail security – Pretty Good Privacy
(PGP) – Notation, Operational Description,
Cryptographic keys and key rings, Public key
management
Electronic Mail security S/MIME –
Multipurpose Internet Mail Extensions, S/MIME
functionality, Messages, Certificate processing
and enhanced security services
IP security
- Overview, Architecture,
Authentication header
IP security - Encapsulating security payload,
Combining
security
associations,
Key
management
Web Security – Web Security Considerations –
Threats, Web traffic security approaches
Web Security – Secure Socket Layer and
Transport Layer Security – Architecture, SSL
Record Protocol, Change Cipher Spec Protocol,
Alert protocol
Web Security – Secure Socket Layer and
Transport Layer Security – Handshake protocol
Cryptographic Computations and transport layer
security
Secure Electronic Transaction – Overview, Dual
signature and payment processing & Review
CAT II
T1
Teaching
Method
BB
50
T1
BB
50
T1
BB
50
T1,R2
BB
50
T1,R2
BB/OHP
50
T1,R2
BB
50
T1,R2
BB
50
T1,R2
BB
50
T1,R2
BB
50
T1,R2
BB/OHP
50
T1,R2
BB/OHP
75
Ref
DOC/LP/01/28.02.02
LP-CS9259
LESSON PLAN
LP: Rev. No: 00
Sub Code & Name : CS9259 – NETWORK SECURITY
Unit : V
Branch : CS
Date: 12/07/2012
Semester : VII
Page
UNIT V SYSTEM SECURITY
Intruders – Viruses – Worms – Firewalls Design Principles – Trusted Systems.
5
of 6
9
Objective: To learn about system-level security issues, including the threat of and
countermeasures for intruders and viruses, and the use of firewalls and trusted systems
Session
No
51
52
53
54
55
56
57
58
59,60
Topics to be covered
System security - Intruders – Intrusion detection,
Password management
System security - Malicious software – Virus
and related threats
System security - Malicious software - Virus
countermeasures
System security - Malicious software
System security - Distributed Denial of Service
Attacks
System security - Firewalls – Design principles
System security -- Trusted systems
Review
CAT III
Time
In min
50
Ref
T1,R3
Teaching
Method
BB/OHP
50
T1,R3
BB/OHP
50
T1,R3
BB
50
50
T1
T1
BB
BB
50
50
50
75
T1,R3
T1,R3
T1,R3
BB
BB
BB
DOC/LP/01/28.02.02
LP-CS9259
LESSON PLAN
LP: Rev. No: 00
Sub Code & Name : CS9259 – NETWORK SECURITY
Branch : CS
Date: 12/07/2012
Semester : VII
Page
6
of 6
Course Delivery Plan
Week
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
I II
I II
I II
I II
I II
I II
I II
I II
I II
I II
I II
I II
I II
I II
I II
Units
1
2
3
4
5
BOOKS FOR STUDY:
TEXT BOOK:
1. Stallings, Cryptography & Network Security - Principles & Practice, Prentice Hall, 3rd Edition,
2002.
REFERENCES:
1. Bruce, Schneier, Applied Cryptography, 2nd Edition, Toha Wiley & Sons, 1996.
2. Man Young Rhee, “Internet Security”, Wiley, 2003.
3. Pfleeger & Pfleeger, “Security in Computing”, Pearson Education, 3rd Edition, 2003.
Prepared by
Approved by
Signature
Name
Ms.R.Jayabhaduri
Dr. T. K Thivakaran
Designation
Assistant Professor/CS
HOD, Department of CS
Date
12/07/2012
12/07/2012