Network Security Question Paper

Network Security






                                                  Network security

MCA303 Network security
Subject Code Subject Name Teaching Scheme (Contact Hours per week) Credits Assigned
Theory Pract Tut Theory Pract Tut Total
MCA303 Network security 04 04 04
Examination Scheme
Theory Term Work Pract Oral Total
Internal Assessment End Sem. Exam.

[ Once in a semester ]

Test 1 Test 2 Average
20 20 20 80 100

 

Objectives In this course students will learn about different aspects of security. , major hash functions, various forms authentications and cryptographic algorithms such as public key cryptographic algorithm, secret key cryptographic algorithm etc. Students are introduced to different security protocols required for E-mail security and for secure electronic transactions last but not the list they will learn two most important security threats i.e. Viruses and Intruders.

Outcomes Students will learn importance of security over internet. They will be familiar with how the security is achieved using as various cryptographic algorithms such as public key cryptographic algorithm, secret key cryptographic algorithm, hashing algorithms etc. Students will have knowledge of different security protocols required for E-mail security and for secure electronic transactions as well as most important security threats.

Unit No                                                                       Contents                                                             No of. Hrs.

 

Unit I                 Introduction:  Attacks,  Services  and  Mechanisms,  Security Attacks, Security Services, Integrity check, digital Signature, authentication, hash algorithms

Unit II                Secret Key Cryptography:  Block Encryption, DES rounds, S-    Boxes IDEA: overview, comparison with DES, Key expansion, IDEA rounds,

Uses    of   Secret   key    Cryptography;    ECB,   CBC,   OFB,   CFB,   Multiple encryptions DES.

Unit III              Public Key Cryptography:  Introduction to modular arithmetic,    RSA, Digital Signature, Deffie-Hellman Key Exchange.

Unit IV              Hash   Functions   and   Message   Digests:   MD2,   MD5,   SHA and  HMAC algorithms

Unit V                Authentication:   Types   of   Authentication-   Password-based   authentication, address-based authentication, cryptographic authentication, smart cards, biometrics, mutual authentications, reflection attacksDigital Certificate- creation, verification, revocation, cross-certificationKDC-working, multi domain KDC

Unit VI              Standard:   Introduction   to   Kerberos,   working   of     Kerberos,   Inter-realm authentication, Kerberos versions and comparison, names, inter-realm authentication, Key version numbersdelegation, forwarding and proxies, ticket lifetimes, revoking tickets

Unit VII             Internet Security Protocols: SSL, SET, Email Security- PGP,  PEM, S/MIME, IPSec-Overview, Authentication Header, ESP

Unit VIII           Firewall and Intrusion detection System: Introduction to Firewalls,   its types, Intrusion Detection: Methods and Modes, Response, Detection mechanism, Honeypots-purpose, categories, use.

Instructions for conducting Tutorials: At least 08 tutorials

  1. Numerical problems on DES, IDEA, MD2, MD5, Deffie-Helmann and RSA
  2. Tutorial on Comparative study of network Tools: TCPDUMP, Wireshark,NMap
  3. Tutorial on SHTTP
  4. Tutorial on TLS

 

References

  1. AtulKahate, “Cryptography and Network Security”, McGraw Hill
  2. Kaufman C., Perlman R., and Speciner, “Network Security”, Private Communication in a public world, 2nd ed., Prentice Hall ,2002
  3. Eric Cole, “Network Security Bible”, Wiley India Edition
  4. Network Security & Cryptography, 1e, Bernard Menezes, Cengage Learning
  5. Willam Stallings, “Cryptography and Network Security: Principles and Practice”, 3rd ed., Prentice Hall PTR.,2003.
  6. Stallings, “W.Network security Essentials: Applications and standards”, Prentice Hall, 2000
  7. Behrouz A Forouzan, “Cryptography & Network Security” ,McGraw-Hill
  8. Cloud security and privacy   by Tim Mather kumaraswamyoreilly