DOC/LP/01/28.02.02 LESSON PLAN Sub Code & Name: EC2035 CRYPTOGRAPHY AND NETWORK SECURITY Unit : I UNIT I Branch : EC Semester: VII LP – EC2035 LP Rev. No: 01 Date: 23/06/14 Page 01 of 06 INTRODUCTION 10 Syllabus: OSI Security Architecture - Classical Encryption techniques – Cipher Principles – Data Encryption Standard – Block Cipher Design Principles and Modes of Operation - Evaluation criteria for AES – AES Cipher – Triple DES – Placement of Encryption Function – Traffic Confidentiality. Objective: To introduce the concept of Symmetric Encryption including classical and modern algorithm. Session No. 1. 2. 3. 4. 5. 6. 7. 8. 9. Topics to be covered Introduction to Cryptography and Network Security OSI Security Architecture – Security attack, Security mechanism and Security services Classical Encryption techniques – Symmetric cipher model, Substitution and Transposition techniques, Stegnography. Cipher principles – Stream cipher and Block cipher, Fiestel Cipher, Confusion and Diffusion Data Encryption Standard (DES) – DES Encryption and Decryption Block Cipher Design Principles and Modes of Operation Evaluation criteria for AES – Origin and Evaluation AES Cipher – Substitute Bytes transformation, ShiftRows transformation, MixColumns transformation AES Cipher – AddRoundKey transformation, AES Key Expansion, Equivalent Inverse Cipher and Implementation Aspects. Time Ref Teaching Method 50m 1, 2 BB 50m 1, 2 BB 50m 1, 2 BB 50m 1, 6 BB 50m 2, 4,9 BB/PPT/ICT 50m 2, 6 BB/PPT 50m 1, 2, 4 BB/PPT 50m 1, 2, 4,10 BB/PPT/ICT 50m 1, 2, 4 BB/PPT 10. Triple DES – with two keys and three keys 50m 2, 4 BB 11. Placement of Encryption Function and Traffic Confidentiality – Link and End-to-End Encryption 50m 2, 4 BB DOC/LP/01/28.02.02 LESSON PLAN Sub Code & Name: EC2035 CRYPTOGRAPHY AND NETWORK SECURITY Unit : II UNIT II Branch : EC Semester: VII LP – EC2035 LP Rev. No: 01 Date: 23/06/14 Page 02 of 06 PUBLIC KEY CRYPTOGRAPHY 10 Syllabus: Key Management - Diffie-Hellman key Exchange – Elliptic Curve Architecture and Cryptography Introduction to Number Theory – Confidentiality using Symmetric Encryption – Public Key Cryptography and RSA. Objective: To distinguish between symmetric key and asymmetric key crypto system and to discuss the public-key algorithm including RSA and Elliptic curve. Session No. 12. 13. 14. 15. 16. Topics to be covered Key Management – Distribution of Public key and Secret keys Diffie-Hellman key Exchange – Algorithm, Key Exchange Protocols and Man-in-the-Middle protocol Elliptic Curve Architecture Elliptic Curve Cryptography – Encryption and Decryption Introduction to Number Theory – Fermat’s and Euler’s theorem and Discrete Logarithms Time Ref Teaching Method 50m 1, 3 BB 50m 1, 3 BB 50m 1, 2, 5 BB 50m 1, 2, 5 BB 50m 1, 2 BB CAT I 90m 17. Problems on Number Theory 50m 1, 2 BB 18. Confidentiality using Symmetric Encryption – Key Distribution , Random Number Generation 50m 1, 8 BB 19. Public Key Cryptography - Principles 50m 1, 8 BB 20. RSA – Description of the algorithm, Computational aspect. 50m 1, 2, 8,11 BB/PPT/ICT 21. RSA - Security 50m 1, 2, 8 BB,PPT DOC/LP/01/28.02.02 LESSON PLAN Sub Code & Name: EC2035 CRYPTOGRAPHY AND NETWORK SECURITY Unit : III UNIT III Branch : EC Semester: VII LP – EC2035 LP Rev. No: 01 Date: 23/06/14 Page 03 of 06 AUTHENTICATION AND HASH FUNCTION 9 Syllabus: Authentication requirements – Authentication functions – Message Authentication Codes – Hash Functions – Security of Hash Functions and MACs – MD5 message Digest 51 algorithm – Secure Hash Algorithm – RIPEMD – HMAC Digital Signatures – Authentication Protocols – Digital Signature Standard. Objective: To define Message Authentication and to discuss MAC and Hash function. Session No. Topics to be covered Time Ref Teaching Method 22. Authentication requirements and Functions 50m 1, 4 BB 23. Message Authentication Codes – Requirements 50m 1, 4 BB/PPT 50m 1, 4 BB 50m 1, 2, 4 BB 24. 25. Hash Functions – Requirements, Birthday attack and Block chaining techniques Security of Hash Functions and MACs – BruteForce attacks and Cryptanalysis 26. Message Digest 5 algorithm 50m 3 BB/PPT 27. Secure Hash Algorithm – SHA-512 Logic and Round Function 50m 1, 3 BB/PPT 28. RIPEMD, HMAC – Algorithm and Security 50m 1, 3 BB 50m 1, 2, 3 BB 50m 1, 3, 8 BB 50m 1, 3, 8 BB 29. 30. 31. Digital Signatures – Requirements, Direct and Arbitrated Digital signature Authentication Protocol – Mutual and One-way authentication Digital Signature Standard – Approach and Algorithm. DOC/LP/01/28.02.02 LESSON PLAN Sub Code & Name: EC2035 CRYPTOGRAPHY AND NETWORK SECURITY Unit : IV UNIT IV Branch : EC Semester: VII LP – EC2035 LP Rev. No: 01 Date: 23/06/14 Page 04 of 06 NETWORK SECURITY 8 Syllabus: Authentication Applications: Kerberos – X.509 Authentication Service – Electronic Mail Security – PGP – S/MIME – IP Security – Web Security. Objective: To examine the use of cryptographic algorithm and security protocol to provide security over network and the Internet. Session No. 32. 33. Topics to be covered Authentication application – Kerberos – Version 4 and 5 X.509 Authentication Service – Certificates, Authentication Procedures and X.509 Version 3 CAT II 34. 35. Electronic Mail Security: PGP – Notation, Operational Description, Cryptographic Keys and Key Rings, Public Key Management S/MIME – RFC 822, Multipurpose Internet Mail Extensions, Functionality, Messages and Certificate Processing Time Ref Teaching Method 50m 1, 2, 5 BB/OHP 50m 1, 2, 5 BB/OHP 50m 1, 2 BB 50m 1, 2 BB 90m 36. IP Security - Overview and Architecture 50m 1, 2, 8 BB 37. IP Security – Authentication Header 50m 1, 2, 8 BB 50m 1, 2, 8 BB 50m 1, 2, 5 BB/OHP 50m 1, 2 BB/PPT 38. 39. 40. IP Security – Encapsulating Security Payload and Combining Security Association Web Security – Secure Socket Layer (SSL) and Transport Layer Security Web Security – Secure Electronic Transaction (SET) DOC/LP/01/28.02.02 LESSON PLAN Sub Code & Name: EC2035 CRYPTOGRAPHY AND NETWORK SECURITY Unit : V UNIT V Branch : EC Semester: VII LP – EC2035 LP Rev. No: 01 Date: 23/06/14 Page 05 of 06 SYSTEM LEVEL SECURITY 8 Syllabus: Intrusion detection – password management – Viruses and related Threats – Virus Counter measures – Firewall Design Principles – Trusted Systems. Objective: To deals with security facilities designed to protect a computer system from security threats, including intruders, viruses and worms. Session No. 41. 42. 43. Topics to be covered Intrusion Detection – Different Approaches Password Management – Password Protection and Password Selection Strategies Viruses and Related Threats – Nature and Types of Viruses and Worms Time Ref Teaching Method 50m 1, 7,12 BB/ICT 50m 1, 4 BB 50m 1, 4 BB/PPT 44. Worms and State of Worm technology 50m 1, 4 BB/PPT 45. Virus Countermeasures – Antivirus approaches and Techniques 50m 1, 4, 7 BB/PPT 46. Firewall Design Principles – Characteristics 50m 1, 8,12 BB/ICT 47. Firewall Design Principles – Types and Configuration 50m 1, 8 BB 48. Trusted Systems – Data Access Control, Concept and Trojan Horse Defense 50m 1, 4 BB CAT – III 90m - - DOC/LP/01/28.02.02 LESSON PLAN Sub Code & Name: EC2035 CRYPTOGRAPHY AND NETWORK SECURITY Branch : EC Semester: VII LP – EC2035 LP Rev. No: 01 Date: 23/06/14 Page 06 of 06 Course Delivery Plan: 1 Week I 2 II I Units 3 II I I 4 II I 5 II I 6 II I 7 II I II CAT I 8 II I III 9 II I 10 I II II 11 I II IV 12 I II V CAT III CAT II TEXT BOOK 1. 2. William Stallings, “Cryptography and Network Security – Principles and Practices”, Pearson Education, Third Edition, 2003. Behrouz A. Foruzan, “Cryptography and Network Security”, Tata McGraw-Hill, 2007. REFERENCES Bruce Schneier, “Applied Cryptography”, John Wiley & Sons Inc, 2001. Charles B. Pfleeger, Shari Lawrence Pfleeger, “Security in Computing”, Third Edition, Pearson Education, 2003. 5. Wade Trappe and Lawrence C. Washington, “Introduction to Cryptography with coding theory”, Pearson Education, 2007. 6. Wenbo Mao, “Modern Cryptography Theory and Practice”, Pearson Education, 2007. 7. Thomas Calabrese, “Information Security Intelligence : Cryptographic Principles and Applications”, Thomson Delmar Learning, 2006. 8. Atul Kahate, “Cryptography and Network Security”, Tata McGraw-Hill, 2003. 9. http://nptel.ac.in/courses/106105031/11 10. http://nptel.ac.in/courses/106105031/12 11. http://nptel.ac.in/courses/106105031/28 12. http://nptel.ac.in/courses/106105031/40 3. 4. Prepared by Approved by Name R.Kousalya Dr.S.Ganesh Vaidyanathan Designation Assistant Professor HoD - EC Date 23/06/2014 23/06/2014 Signature
© Copyright 2026 Paperzz