Birla Institute of Technology & Science, Pilani Work-Integrated Learning Programmes Division Second Semester 2013-2014 Course Handout Course No. Course Title Instructor : SS ZG513 : Network Security : Rahul Banerjee Course Description The primary goal of the course is to introduce the student to system and application design aspects of network security including cryptographic, systemic and computational security aspects of the network / internetwork systems. Objective and Scope of the Course This course aims at providing a sound conceptual foundation in the area of Network Security with emphasis on the design aspects while adopting combination of the systems approach. The course attempts to provide a balanced treatment of the state-of-the-art in the area and thus prepares the students for taking more rigorous and specialized courses in this and related fields. At the end of this course, students should be able to design, build and analyze simple network security architectures and systems. Course Material Being a graduate-level course, no single book would actually suffice for the purpose of this course. In addition, from time to time, students would be expected to consult identified material from different sources including research papers, standards, patents and case-studies. Prescribed Text book T1. William Stallings: Cryptography and Network Security, 5th Edition, Prentice-Hall / Pearson Education, Englewood Cliffs /New Delhi, 2011. (A new edition has appeared as: William Stallings: Cryptography and Network Security, 6th Edition, Prentice-Hall Inc., 2013. Unfortunately, as of now Indian reprint is not available. Those, who can afford it, are encouraged to use the new edition.) Reference Books: <Other than those to be specified by the Instructors, topic-wise> R1. Bruce Schenier: Applied Cryptography, Second Edition, John Wiley & Sons, Singapore, 2011. R2. Seymore Bosworth, M. E. Kabay & Eric Whyne: Computer Security Handbook, Vols. 1 & 2, 5th Edition, John Wiley & Sons, Inc. N.J., 2009. SS ZG513 (Course Handout) Second Semester 2013-2014 Page 2 Plan of Self Study Sections of the Text Book Part-I: Introduction to Network and Internetwork Security: Systems & Application Perspective Introduction to Network Security, Systems and Cryptographic approaches, How 1.0 1. would this course be conducted? Elements and aspects of Network Security, Network Security Architectures, 1.1, 1.2 Example An overview of types of Security attacks and breaches, Concept of Security 1.3, 1.4, 1.5, 1.6 services, Associated Security Mechanisms, Models of Network Security, Examples Reference Material 2. Security at the Network / IP level (RFCs on IPSec) IP-level Security, Need, Implications, Mechanisms, Choices, Applications, 19.0, 19.1, 19.3, Examples 19.4, 19.5 Reference Material Security in IPv4 and IPv6, Trade-offs involved, Points to take-away (RFCs on IPSec) Extracts from C-18 Virtual Private Networks, Purpose, Types, Principles involved, Applications and 19 3. Security at the Transport and Application level Need for Application-level and Transport-level security, Mechanisms, 16.0, 16.1 Techniques, Applications, Examples Security for the Web-based Transactions, SSL and TLS 16.1, 16.2, 16.3 Of HTTPS and Secure Shell (SSH) 16.4, 16.5 E-mail Security, Need, Mechanisms, Choices, Examples 18.0-18.3 Designing secure networks and internetworks, Basic idea, Process involved, Online material 4. Devices, Positioning, Configuration and Trade-offs, Examples, Firewalls and links as provided at: More on Firewalls, Intrusion Detection Systems and Perimeter Security http://williamstallings.com/Cr Of Virus, Worms, other malware and Spyware yptography/Crypto6e-Student/ Security in Clouds: Facts and Myths, Current Status, Emerging trends, Examples Online material or Recent Advances in Network Security technology, Emerging trends, Best select research practices, Take-away points papers Part-II: Cryptographic Principles, Algorithms, Techniques and Standards Brief recapitulation of mathematical techniques and tools used in a range of Select portions of 5. cryptographic designs Chapters 4 & 5 Steganography, Substitution Ciphers, Transposition Ciphers 2.0-2.3, 9.0-9.1 Of Pseudo-Random Numbers and their generation, Relevance, Applications, 7.0. 7.1. 7.2 Techniques, Examples Generating Pseudo-Random Numbers using Block-Ciphers: the basic idea 7.3 Stream Ciphers, Applications, Examples 7.4 The RC4 Stream Cipher and other Stream Ciphers of interest 7.5 True Random Numbers and their generation 7.6 6. Introduction to Block Ciphers, Principles, Examples 3.0, 3.1, 3.6 The DES Standard and its current variants 3.2, 3.3, 3.4 Cryptanalysis: An overview of the basics, current trends S. No. Topic(s) to be discussed S. No. Topic(s) to be discussed Sections of the Text Book Examples of use of common mathematical techniques of interest, Example, AES: The Advanced Encryption Standard and its variants Block Cipher Design Principles, Multiple Encryption, Examples 6.0 Triple-DES and its variants 6.1 An overview of the NIST-defined Block Cipher Modes of Operation, Types (05), 6.2, 6.3, 6.4, 6.5, Examples 6.6, 6.7 Brief recapitulation of Number Theory in the context of Cryptography, Select Portions of Examples of use of common mathematical techniques of interest, Example, Chapter 8 Significance of Prime Numbers and Primality Testing etc. <self-study> Syllabus for Mid-Semester Test (Closed Book): Topics in S. No. 1 to 6 Fundamentals of Asymmetric Cryptography, Rationale, Basis, Issues, 9.0, 9.1 7. Applications, Examples The RSA Algorithm, Principle, Mechanism, Design, Critique, Applications 9.2 Select portions of Alternatives, Brief overview, Trade-offs, Points to take away, Design tips Chapter 10 Introduction to Cryptographic Hashing, Techniques, Principles, Applications, 11.0, 11.1, 11.5 Examples Authentication using cryptographic hashing, Example, Message authentication 11.1 Introduction to Digital Signatures & Digital Certificates, Principles, 11.1 Applications An overview of Message Authentication Codes (MACs), Principle, Applications, 12.0 and 12,1-12.8 Examples Brief recapitulation of Number Theory in the context of Cryptography <selfSelect portions of 8. study> Chapter 8 Examples of use of common mathematical techniques of interest, Example, Significance of Prime Numbers and Primality Testing etc. Fundamentals of Asymmetric Cryptography, Rationale, Basis, Issues, 9.0, 9.1 Applications, Examples The RSA Algorithm <latest version>, Principle, Mechanism, Design, Critique, 9.2 Applications Select portions of Alternatives, Brief overview, Trade-offs, Points to take away, Design tips Chapter 10 Introduction to Cryptographic Hashing, Techniques, Principles, Applications, 11.0, 11.1, 11.5 9. Examples Authentication using cryptographic hashing, Example, Message authentication 11.1 Introduction to Digital Signatures & Digital Certificates, Principles, 11.1 Applications An overview of Message Authentication Codes (MACs), Principle, Applications, 12.0 and 12.1-12.8 Examples Part-IV: Putting all pieces together 13.0, 13.1, 13.4, Security in the context of E-commerce / m-commerce, document interchange, e- Select portions 10. Voting, from Chapter-14, Reference Material Authentication of Remote Users, Issues, Mechanisms, Examples, Kerberos-based Select portions 11. security scenarios from Chapter 15 12. Biometrics in Network and Internet Security, e-Passports, e-VISA and more Reference material Sections of the Text Book Portions of 13. Security in Wireless Networks, Basic problems, Issues, Techniques, Examples Chapter 17, References Case-Studies on: Online Notes / Firewalls, Intrusion Detection Systems and Perimeter Security, Anti-Virus, Anti- Reference Material 14-16. Worms, Anti-Spyware and other Anti-malware systems, State-of-the-art practices in Modern Network and Internetwork Security Special Concept summarization, Discussions on a Design Problem / Case-study Session: covering all major aspects of Networking covered during the semester S. No. Topic(s) to be discussed Syllabus for Comprehensive Exam (Open Book): All topics given in Plan of Self Study Evaluation Scheme: EC No. EC-1 EC-2 EC-3 Evaluation Component & Type of Examination Assignment/Quiz Mid-Semester Test (Closed Book)* Comprehensive Exam (Open Book)* Duration ** Details to be announced on LMS Taxila website by Instructor 2 Hours 3 Hours Weightage 15% 35% 50% Day, Date, Session,Time ** Details to be announced on LMS Taxila website by Instructor Saturday, 15/02/2014 (FN)* 10 AM – 12 Noon Saturday, 05/04/2014 (FN)* 9 AM – 12 Noon ** Please check the details by January 10, 2014 on LMS Taxila web site. AN: AfterNoon Session; FN: ForeNoon Session Closed Book Test: No reference material of any kind will be permitted inside the exam hall. Open Book Exam: Use of any printed / written reference material (books and notebooks) will be permitted inside the exam hall. Loose sheets of paper will not be permitted. Computers of any kind will not be allowed inside the exam hall. Use of calculators will be allowed in all exams. No exchange of any material will be allowed. Note: It shall be the responsibility of the individual student to be regular in maintaining the self study schedule as given in the course handout, attend the online/on demand lectures as per details that would be put up in the BITS LMS Taxila website www.taxila.bits-pilani.ac.in and take all the prescribed components of the evaluation such as Assignment (Course Page on LMS Taxila), Mid Semester Test and Comprehensive Examination according to the Evaluation Scheme given in the respective Course Handout. If the student is unable to appear for the Regular Test/Examination due to genuine exigencies, the student must refer to the procedure for applying for Make-up Test/Examination, which will be available through the Important Information link on the BITS LMS Taxila website www.taxila.bits-pilani.ac.in on the date of the Regular Test/Examination. The Make-up Tests/Exams will be conducted only at selected exam centres on the dates to be announced later. Instructor-in-Charge
© Copyright 2026 Paperzz