EC2035

DOC/LP/01/28.02.02
LESSON PLAN
Sub Code & Name: EC2035 CRYPTOGRAPHY AND
NETWORK SECURITY
Unit : I
UNIT I
Branch : EC
Semester: VII
LP – EC2035
LP Rev. No: 01
Date: 23/06/14
Page 01 of 06
INTRODUCTION
10
Syllabus:
OSI Security Architecture - Classical Encryption techniques – Cipher Principles – Data Encryption
Standard – Block Cipher Design Principles and Modes of Operation - Evaluation criteria for AES –
AES Cipher – Triple DES – Placement of Encryption Function – Traffic Confidentiality.
Objective: To introduce the concept of Symmetric Encryption including classical and modern
algorithm.
Session
No.
1.
2.
3.
4.
5.
6.
7.
8.
9.
Topics to be covered
Introduction to Cryptography and Network Security
OSI Security Architecture – Security attack, Security
mechanism and Security services
Classical Encryption techniques – Symmetric cipher
model, Substitution and Transposition techniques,
Stegnography.
Cipher principles – Stream cipher and Block cipher,
Fiestel Cipher, Confusion and Diffusion
Data Encryption Standard (DES) – DES Encryption and
Decryption
Block Cipher Design Principles and Modes of
Operation
Evaluation criteria for AES – Origin and Evaluation
AES Cipher – Substitute Bytes transformation,
ShiftRows transformation, MixColumns
transformation
AES Cipher – AddRoundKey transformation, AES
Key Expansion, Equivalent Inverse Cipher and
Implementation Aspects.
Time
Ref
Teaching
Method
50m
1, 2
BB
50m
1, 2
BB
50m
1, 2
BB
50m
1, 6
BB
50m
2, 4,9
BB/PPT/ICT
50m
2, 6
BB/PPT
50m
1, 2, 4
BB/PPT
50m
1, 2,
4,10
BB/PPT/ICT
50m
1, 2, 4
BB/PPT
10.
Triple DES – with two keys and three keys
50m
2, 4
BB
11.
Placement of Encryption Function and Traffic
Confidentiality – Link and End-to-End Encryption
50m
2, 4
BB
DOC/LP/01/28.02.02
LESSON PLAN
Sub Code & Name: EC2035 CRYPTOGRAPHY AND
NETWORK SECURITY
Unit : II
UNIT II
Branch : EC
Semester: VII
LP – EC2035
LP Rev. No: 01
Date: 23/06/14
Page 02 of 06
PUBLIC KEY CRYPTOGRAPHY
10
Syllabus:
Key Management - Diffie-Hellman key Exchange – Elliptic Curve Architecture and Cryptography Introduction to Number Theory – Confidentiality using Symmetric Encryption – Public Key
Cryptography and RSA.
Objective: To distinguish between symmetric key and asymmetric key crypto system and to
discuss the public-key algorithm including RSA and Elliptic curve.
Session
No.
12.
13.
14.
15.
16.
Topics to be covered
Key Management – Distribution of Public key and
Secret keys
Diffie-Hellman key Exchange – Algorithm, Key
Exchange Protocols and Man-in-the-Middle protocol
Elliptic Curve Architecture
Elliptic Curve Cryptography – Encryption and
Decryption
Introduction to Number Theory – Fermat’s and Euler’s
theorem and Discrete Logarithms
Time
Ref
Teaching
Method
50m
1, 3
BB
50m
1, 3
BB
50m
1, 2, 5
BB
50m
1, 2, 5
BB
50m
1, 2
BB
CAT I
90m
17.
Problems on Number Theory
50m
1, 2
BB
18.
Confidentiality using Symmetric Encryption – Key
Distribution , Random Number Generation
50m
1, 8
BB
19.
Public Key Cryptography - Principles
50m
1, 8
BB
20.
RSA – Description of the algorithm, Computational
aspect.
50m
1, 2,
8,11
BB/PPT/ICT
21.
RSA - Security
50m
1, 2, 8
BB,PPT
DOC/LP/01/28.02.02
LESSON PLAN
Sub Code & Name: EC2035 CRYPTOGRAPHY AND
NETWORK SECURITY
Unit : III
UNIT III
Branch : EC
Semester: VII
LP – EC2035
LP Rev. No: 01
Date: 23/06/14
Page 03 of 06
AUTHENTICATION AND HASH FUNCTION
9
Syllabus:
Authentication requirements – Authentication functions – Message Authentication Codes – Hash
Functions – Security of Hash Functions and MACs – MD5 message Digest 51 algorithm – Secure
Hash Algorithm – RIPEMD – HMAC Digital Signatures – Authentication Protocols – Digital
Signature Standard.
Objective: To define Message Authentication and to discuss MAC and Hash function.
Session
No.
Topics to be covered
Time
Ref
Teaching
Method
22.
Authentication requirements and Functions
50m
1, 4
BB
23.
Message Authentication Codes – Requirements
50m
1, 4
BB/PPT
50m
1, 4
BB
50m
1, 2, 4
BB
24.
25.
Hash Functions – Requirements, Birthday attack
and Block chaining techniques
Security of Hash Functions and MACs – BruteForce attacks and Cryptanalysis
26.
Message Digest 5 algorithm
50m
3
BB/PPT
27.
Secure Hash Algorithm – SHA-512 Logic and
Round Function
50m
1, 3
BB/PPT
28.
RIPEMD, HMAC – Algorithm and Security
50m
1, 3
BB
50m
1, 2, 3
BB
50m
1, 3, 8
BB
50m
1, 3, 8
BB
29.
30.
31.
Digital Signatures – Requirements, Direct and
Arbitrated Digital signature
Authentication Protocol – Mutual and One-way
authentication
Digital Signature Standard – Approach and
Algorithm.
DOC/LP/01/28.02.02
LESSON PLAN
Sub Code & Name: EC2035 CRYPTOGRAPHY AND
NETWORK SECURITY
Unit : IV
UNIT IV
Branch : EC
Semester: VII
LP – EC2035
LP Rev. No: 01
Date: 23/06/14
Page 04 of 06
NETWORK SECURITY
8
Syllabus:
Authentication Applications: Kerberos – X.509 Authentication Service – Electronic Mail Security –
PGP – S/MIME – IP Security – Web Security.
Objective: To examine the use of cryptographic algorithm and security protocol to provide security
over network and the Internet.
Session
No.
32.
33.
Topics to be covered
Authentication application – Kerberos – Version 4 and
5
X.509 Authentication Service – Certificates,
Authentication Procedures and X.509 Version 3
CAT II
34.
35.
Electronic Mail Security: PGP – Notation, Operational
Description, Cryptographic Keys and Key Rings,
Public Key Management
S/MIME – RFC 822, Multipurpose Internet Mail
Extensions, Functionality, Messages and Certificate
Processing
Time
Ref
Teaching
Method
50m
1, 2, 5
BB/OHP
50m
1, 2, 5
BB/OHP
50m
1, 2
BB
50m
1, 2
BB
90m
36.
IP Security - Overview and Architecture
50m
1, 2, 8
BB
37.
IP Security – Authentication Header
50m
1, 2, 8
BB
50m
1, 2, 8
BB
50m
1, 2, 5
BB/OHP
50m
1, 2
BB/PPT
38.
39.
40.
IP Security – Encapsulating Security Payload and
Combining Security Association
Web Security – Secure Socket Layer (SSL) and
Transport Layer Security
Web Security – Secure Electronic Transaction (SET)
DOC/LP/01/28.02.02
LESSON PLAN
Sub Code & Name: EC2035 CRYPTOGRAPHY AND
NETWORK SECURITY
Unit : V
UNIT V
Branch : EC
Semester: VII
LP – EC2035
LP Rev. No: 01
Date: 23/06/14
Page 05 of 06
SYSTEM LEVEL SECURITY
8
Syllabus:
Intrusion detection – password management – Viruses and related Threats – Virus Counter
measures – Firewall Design Principles – Trusted Systems.
Objective: To deals with security facilities designed to protect a computer system from security
threats, including intruders, viruses and worms.
Session
No.
41.
42.
43.
Topics to be covered
Intrusion Detection – Different Approaches
Password Management – Password Protection and
Password Selection Strategies
Viruses and Related Threats – Nature and Types of
Viruses and Worms
Time
Ref
Teaching
Method
50m
1, 7,12
BB/ICT
50m
1, 4
BB
50m
1, 4
BB/PPT
44.
Worms and State of Worm technology
50m
1, 4
BB/PPT
45.
Virus Countermeasures – Antivirus approaches and
Techniques
50m
1, 4, 7
BB/PPT
46.
Firewall Design Principles – Characteristics
50m
1, 8,12
BB/ICT
47.
Firewall Design Principles – Types and Configuration
50m
1, 8
BB
48.
Trusted Systems – Data Access Control, Concept and
Trojan Horse Defense
50m
1, 4
BB
CAT – III
90m
-
-
DOC/LP/01/28.02.02
LESSON PLAN
Sub Code & Name: EC2035 CRYPTOGRAPHY AND
NETWORK SECURITY
Branch : EC
Semester: VII
LP – EC2035
LP Rev. No: 01
Date: 23/06/14
Page 06 of 06
Course Delivery Plan:
1
Week
I
2
II I
Units
3
II I
I
4
II I
5
II I
6
II I
7
II I
II
CAT I
8
II I
III
9
II I
10
I II
II
11
I II
IV
12
I II
V
CAT III
CAT II
TEXT BOOK
1.
2.
William Stallings, “Cryptography and Network Security – Principles and Practices”,
Pearson Education, Third Edition, 2003.
Behrouz A. Foruzan, “Cryptography and Network Security”, Tata McGraw-Hill, 2007.
REFERENCES
Bruce Schneier, “Applied Cryptography”, John Wiley & Sons Inc, 2001.
Charles B. Pfleeger, Shari Lawrence Pfleeger, “Security in Computing”, Third Edition,
Pearson Education, 2003.
5. Wade Trappe and Lawrence C. Washington, “Introduction to Cryptography with
coding theory”, Pearson Education, 2007.
6. Wenbo Mao, “Modern Cryptography Theory and Practice”, Pearson Education,
2007.
7. Thomas Calabrese, “Information Security Intelligence : Cryptographic Principles and
Applications”, Thomson Delmar Learning, 2006.
8. Atul Kahate, “Cryptography and Network Security”, Tata McGraw-Hill, 2003.
9. http://nptel.ac.in/courses/106105031/11
10. http://nptel.ac.in/courses/106105031/12
11. http://nptel.ac.in/courses/106105031/28
12. http://nptel.ac.in/courses/106105031/40
3.
4.
Prepared by
Approved by
Name
R.Kousalya
Dr.S.Ganesh Vaidyanathan
Designation
Assistant Professor
HoD - EC
Date
23/06/2014
23/06/2014
Signature