LESSON PLANLP EC2035 LP Rev. No: 00 Date: 06/07/11 Page 01 of 06

daughterinsectAI and Robotics

Nov 21, 2013 (3 years and 10 months ago)

312 views

DOC/LP/00
/2
1
.0
1
.0
5


LESSON PLAN

LP


EC2035

LP Rev. No: 00

Date:
06
/
0
7
/
11

Page 01 of 06

Sub Code & Name:
EC2035

CRYPTOGRAPHY AND
NETWORK SECURITY

Unit : I Branch : EC
Semester: VI
I


UNIT I


INTRODUC
TION








10

Syllabus:

OSI Security Architecture
-

Classical Encryption techniques


Cipher Principles


Data

Encryption Standard


Block Cipher Design Principles and Modes of Operation
-

Evaluation
criteria for AES


AES Cipher


Triple DES


Placement

of Encryption

Function


Traffic
Confidentiality
.


Objective:
To
introduce
the
concept of
Symmetric
Encryption including classical and
modern algorithm.

Session
No.

Topics to be covered

Time

Ref

Teaching
Method

1.


Introduction to Cryptography and Network S
ecurity

50m

1, 2

BB

2.


OSI Security Architecture



pec畲楴y⁡瑴ac欬⁓ec畲楴y
浥m桡湩獭⁡湤⁓ecu物ry 獥牶楣es

㔰5

ㄬ′






Classical Encryption techniques



py浭e瑲楣⁣楰ie爠
浯摥氬⁓畢獴楴畴楯渠慮搠i牡湳灯獩瑩潮⁴散桮楱略hⰠ
p瑥t湯gra灨yK

㔰5


ㄬ′






Ciph
er principles


pt牥am cip桥r⁡nd⁂l潣k⁣ip桥rI
cies瑥l Cip桥rⰠConfus楯渠and⁄i晦usion

㔰5

ㄬ‶






Data Encryption Standard (DES)


䑅p b湣rypti潮oand
aecrypti潮

㔰5

㈬‴






Block Cipher Design Principles and Modes of
Operation

50m

2, 6

BB

7.


Evaluatio
n criteria for AES



佲楧楮⁡湤⁅va汵慴楯l

㔰5

ㄬ′Ⱐ㐠






AES Cipher



p畢獴楴畴攠Byte猠瑲s湳景f浡瑩潮Ⱐ
p桩晴h潷猠瑲o湳景n浡瑩潮Ⱐ䵩硃潬畭湳n
瑲t湳景n浡瑩潮

㔰5

ㄬ′ⰠN






AES Cipher



䅤摒潵湤䭥y⁴牡湳景牭r瑩潮Ⱐ䅅p
䭥y⁅ 灡湳楯nⰠ䕱畩癡汥湴nf湶n牳r⁃
楰桥i a湤n
f浰me浥湴a瑩潮⁁獰oc瑳t

㔰5

ㄬ′ⰠN



㄰N


Triple DES



睩瑨⁴睯wy猠a湤⁴桲ne ys

㔰5

㈬‴



ㄱN


Placement of Encryption

Function

and
Traffic
Confidentiality



i楮欠an搠䕮d
J

J
䕮搠䕮bry灴p潮

㔰5

㈬‴




C䅔


f

J

J

J




DOC/LP/00
/2
1
.0
1
.0
5



UNIT II

PUBLIC KEY CRYPTOGRAPHY






10

Syllabus:


Key Management
-

Diffie
-
Hellman key Exchange


Elliptic Curve Architecture and

Cryptography
-

Introduction to Number Theory


Confidentiality using Symmetric

Encryption


Public Key Cryptography and RSA.



Objective:
To
distinguish betw
een symmetric key and a
s
ymmetric key crypto system and to
discuss
the public
-
key algorithm including
RSA
and Elliptic curve
.


Session
No.

Topics to be covered

Time

Ref

Teaching
Method

12.


Key Management



䑩獴r楢畴楯渠潦⁐畢汩c y⁡湤
pec牥琠步ys

㔰5

ㄬ″

B
B

ㄳN


Diffie
-
Hellman key Exchange



䅬g潲楴桭Ⱐ䭥y
䕸c桡湧e⁐牯瑯r潬猠慮搠䵡n
J

J
瑨t
J
䵩摤汥⁰l潴oc潬

㔰5

ㄬ″



ㄴN


Elliptic Curve Architecture

50m

1, 2, 5

BB

15.


Elliptic Curve Cryptography



䕮cry灴p潮⁡湤n
䑥cry灴p潮

㔰5

ㄬ′ⰠN



ㄶN


Introduction to Number T
heory



Fermat’s and Euler’s
瑨敯te洠慮搠m楳i牥瑥tioga物瑨rs

㔰5

ㄬ′



ㄷN


Problems on Number Theory

50m

1, 2

BB

18.


Confidentiality using Symmetric

Encryption



䭥y
䑩獴物扵瑩潮‬⁒a湤潭⁎畭扥n⁇ 湥牡瑩潮

㔰5

ㄬ‸



ㄹN


Public Key Cryptography

-

Principles

5
0m

1, 8

BB

20.


RSA


䑥獣物灴楯渠潦⁴桥⁡汧潲楴桭ⰠI潭灵oa瑩潮o氠
a獰sc琮t

㔰5

ㄬ′ⰠN



㈱2


RSA
-

Security

50m

1, 2, 8

BB


CAT


f
f

J

J

J




LESSON PLAN

LP


E䌲〳C

LP⁒ 瘮v乯N‰

䑡De㨠
0
6

7
⼱/

P慧a‰㈠潦‰

Sub⁃潤攠 ⁎慭e㨠
EC㈰㌵

䍒YPT佇RAP䡙⁁H䐠
久N坏剋⁓E䍕剉呙

啮U琠t⁉䤠††††††††⁂r慮ch›⁅䌠†††††††

Seme獴er㨠
V




DOC/LP/00
/2
1
.0
1
.0
5



LESSON PLAN

LP


EC2035

LP Rev. No: 00

Date:
0
6
/0
7
/11

Page 03 of
06

Sub Code & Name:
EC2035

CRYPTOGRAPHY AND
NETWORK SECURITY

Unit : III Branch : EC

Semester:
V
II


UNIT III

AUTHENTICATION AND HASH FUNCTION




9

Syllabus:

Authentication requirements


Authentication functions


Message

Authentication Codes



Hash Functions


Security of Hash Functions and MACs


MD5 message Digest

51
algorithm


Secure Hash Algorithm


RIPEMD


HMAC Digital Signatures


Authentication
Protocols


Digital Signature Standard
.


Objective:
To
define Message

Authentication and to discuss MAC and Hash function
.


Session
No.

Topics to be covered

Time

Ref

Teaching
Method

22.


Authentication requirements
and F
unctions

50m

1, 4

BB

23.


Message Authentication Codes



Requirements

50m

1, 4

BB

24.


Hash Functions



Requirement
s, Birthday attack
and Block chaining techniques

50m

1, 4

BB

25.


Security of Hash Functions and MACs



Brute
-
Force attacks and Cryptanalysis

50m

1, 2, 4

BB

26.


Message Digest 5 algorithm

50m

3

BB

27.


Message Digest 5 algorithm

50m

3

BB

28.


Secure Hash Algorithm


SHA
-
512 Logic and
Round Function

50m

1, 3

BB

29.


RIPEMD, HMAC


Algorithm and Security

50m

1, 3

BB

30.


Digital Signatures


Requirements, Direct and
Arbitrated Digital signature

50m

1, 2, 3

BB

31.


Authentication Protocol


Mutual and One
-
way
authentication

50m

1, 3, 8

BB

32.


Digital Signature Standard


Approach and
Algorithm.





CAT


III

-

-

-



DOC/LP/00
/2
1
.0
1
.0
5



LESSON PLAN

LP


EC2035

LP Rev. No: 00

Date:
0
6
/0
7
/11

Page 04 of 06

Sub Code & Name:
EC2035

CRYPTOGRAPHY AND
NETWORK SE
CURITY

Unit : IV Branch : EC

Semester:
V
II


UNIT IV

NETWORK SECURITY







8

Syllabus:

Authentication Applications: Kerberos


X.509 Authentication Service


Electronic Mail

Security


PGP


S/MIME


IP Security


Web Secu
rity.


Objective:

To

examine the use of cryptographic algorithm and security protocol to provide
security over network and the Internet.








Session
No.

Topics to be covered

Time

Ref

Teaching
Method

33.


Authentication application


䭥r扥r潳


噥牳ion 4⁡nd


㔰5

ㄬ′ⰠN



㌴P


X.509 Authentication Service



Ce牴楦楣a瑥猬t
䅵瑨A湴nca瑩潮⁐牯re摵de猠s湤⁘⸵〹⁖e牳楯渠r

㔰5

ㄬ′ⰠN



㌵P


Electro
nic Mail Security: PGP


乯瑡瑩潮Ⱐ佰o牡瑩潮o氠
䑥獣物灴楯測⁃ry灴潧牡灨楣⁋ey猠s湤⁋ey⁒楮i猬s
m畢汩c⁋ y⁍a湡ge浥湴m

㔰5

ㄬ′



㌶P


S/MIME


ocC‸㈲Ⱐ䵵汴楰畲灯獥 f湴n牮rt

䵡楬
䕸瑥湳楯湳Ⱐt畮u瑩潮o汩tyⰠ䵥獳sge猠s湤⁃e牴楦楣ate
m牯re獳s湧

㔰5

ㄬ′



㌷P


IP
Security
-

Overview and Architecture

50m

1, 2, 8

BB

38.


IP Security


Aut桥nticat楯n eea摥r

㔰5

ㄬ′ⰠN



㌹P


IP Security


b湣apsu污t楮g pecurity mayload and
Combini湧 pecurity⁁ss潣iation

㔰5

ㄬ′ⰠN



㐰4


Web Security


pecu牥⁓潣步琠iaye爠rppi⤠F湤n
呲an
獰潲琠iaye爠卥ru物ry

㔰5

ㄬ′ⰠN



㐱4


Web Security


pecu牥⁅汥l瑲潮楣⁔ a湳nc瑩潮
卅吩

㔰5

ㄬ′




C䅔




J

J

J


DOC/LP/00
/2
1
.0
1
.0
5



LESSON PLAN

LP


EC2035

LP Rev. No: 00

Date:
0
6
/0
7
/11

Page 05 of 06

Sub Code & Name:
EC2035

CRYPTOGRAPHY AND
NETWORK SECURITY

Unit : V Branch : EC
Semester:
V
II


UNIT V

SYSTE
M LEVEL SECURITY






8


Syllabus:

Intrusion detection


password management


Viruses and related Threats


Virus

Counter
measures


Firewall Design Principles


Trusted Systems
.


Objective:

To
deals with security facilities designed to protect a compu
ter system from
security threats, including intruders, viruses and worms.









Session
No.

Topics to be covered

Time

Ref

Teaching
Method

42.


Intrusion Detection


ai晦e牥nt A灰r潡ches

㔰5

ㄬ‷



㐳4


Intrusion Detection


ai晦e牥nt A灰r潡ches

㔰5

ㄬ‷



㐴4


Passwor
d Management


massw潲d mro瑥cti潮 a湤
massw潲d pe汥cti潮 ptra瑥t楥s

㔰5

ㄬ‴



㐵4


Viruses and Related Threats


乡t畲e⁡nd⁔y灥s o映
siru獥s and torms

㔰5

ㄬ‴



㐶4


Worms and State of Worm technology

50m

1, 4

BB

47.


Virus Countermeasures


Antivirus⁡p灲潡c
桥s

㔰5

ㄬ‴ⰠN



㐸4


Virus Countermeasures


Antivirus⁔echniq略s

㔰5

ㄬ‴ⰠN



㐹4


Firewall Design Principles


Characteristics
ⰠTy灥猠and
Conf楧u牡tion

㔰5

ㄬ‸



㔰5


Trusted Systems


䑡ta⁁ccess C潮trolI Concept⁡nd
Trojan e潲se 䑥晥nse

㔰5

ㄬ‴




C
AT


s

J

J

J



DOC/LP/00
/2
1
.0
1
.0
5



LESSON PLAN

LP


EC2035

LP Rev. No: 00

Date:
06
/0
7
/11

Page 06 of 06

Sub Code & Name:
EC2035

CRYPTOGRAPHY AND
NETWORK SECURITY

Branch : EC


Semester:
V
II


Course Delivery Plan:









CAT I CAT I
I

CAT I
II

CAT I
V


C
AT
V


TEXT BOOK

1.

Wi
lliam Stallings, “Cryptography a
nd Network Security


Principles and P
ractices”,

Pearson Education, Third Edition, 2003.

2.

Behrouz A. Foruzan, “Cryptography and Network Security”, Tata McGraw
-
Hill,
2007
.


REFERENCES

3.

Bruce Schneier, “Applied Cryptography”, John Wiley & Sons Inc, 2001.

4.

Charles B. Pfleeger, Shari Lawrence Pfleege
r, “Security in Computing”, Third
Edition,

Pearson Education, 2003
.

5.

Wade Trappe and Lawrence C. Washington, “Introduction to Cryptography with

coding theory”, Pearson Education, 2007.

6.

Wenbo Mao, “Modern Cryptography Theory and Practice”, Pearson Education,

2007
.

7.

Thomas Calabrese, “Information Security Intelligence : Cryptographic Principles and

Applications”, Thomson Delmar Learning, 2006.

8.

Atul Kahate, “Cryptography and Network Security”, Tata McGraw
-
Hill, 2003.




Week

1

2

3

4

5

6

7

8

9

10

11

12

13

I II

I II

I II

I II

I II

I II

I II

I II

I II

I II

I II

I II

I


Units




































Prepared by

Approved by

Signature




Name

M.Athappan


/

R.Kousalya

Prof.E.G.Govindan

Designation

Assistant Professor

H
o
D, Department of EC
E

Date

0
6
/0
7
/2011

0
6
/0
7
/2011

IV

I

II

III

V