|Subject Code||Subject Name||Teaching Scheme (Contact Hours per week)||Credits Assigned|
|Internal Assessment||End Sem. Exam.|
[ Once in a semester ]
|Test 1||Test 2||Average|
Objectives In this course students will learn about different aspects of security. , major hash functions, various forms authentications and cryptographic algorithms such as public key cryptographic algorithm, secret key cryptographic algorithm etc. Students are introduced to different security protocols required for E-mail security and for secure electronic transactions last but not the list they will learn two most important security threats i.e. Viruses and Intruders.
Outcomes Students will learn importance of security over internet. They will be familiar with how the security is achieved using as various cryptographic algorithms such as public key cryptographic algorithm, secret key cryptographic algorithm, hashing algorithms etc. Students will have knowledge of different security protocols required for E-mail security and for secure electronic transactions as well as most important security threats.
Unit No Contents No of. Hrs.
Unit I Introduction: Attacks, Services and Mechanisms, Security Attacks, Security Services, Integrity check, digital Signature, authentication, hash algorithms
Unit II Secret Key Cryptography: Block Encryption, DES rounds, S- Boxes IDEA: overview, comparison with DES, Key expansion, IDEA rounds,
Uses of Secret key Cryptography; ECB, CBC, OFB, CFB, Multiple encryptions DES.
Unit III Public Key Cryptography: Introduction to modular arithmetic, RSA, Digital Signature, Deffie-Hellman Key Exchange.
Unit IV Hash Functions and Message Digests: MD2, MD5, SHA and HMAC algorithms
Unit V Authentication: Types of Authentication- Password-based authentication, address-based authentication, cryptographic authentication, smart cards, biometrics, mutual authentications, reflection attacksDigital Certificate- creation, verification, revocation, cross-certificationKDC-working, multi domain KDC
Unit VI Standard: Introduction to Kerberos, working of Kerberos, Inter-realm authentication, Kerberos versions and comparison, names, inter-realm authentication, Key version numbersdelegation, forwarding and proxies, ticket lifetimes, revoking tickets
Unit VII Internet Security Protocols: SSL, SET, Email Security- PGP, PEM, S/MIME, IPSec-Overview, Authentication Header, ESP
Unit VIII Firewall and Intrusion detection System: Introduction to Firewalls, its types, Intrusion Detection: Methods and Modes, Response, Detection mechanism, Honeypots-purpose, categories, use.
Instructions for conducting Tutorials: At least 08 tutorials
- Numerical problems on DES, IDEA, MD2, MD5, Deffie-Helmann and RSA
- Tutorial on Comparative study of network Tools: TCPDUMP, Wireshark,NMap
- Tutorial on SHTTP
- Tutorial on TLS
- AtulKahate, “Cryptography and Network Security”, McGraw Hill
- Kaufman C., Perlman R., and Speciner, “Network Security”, Private Communication in a public world, 2nd ed., Prentice Hall ,2002
- Eric Cole, “Network Security Bible”, Wiley India Edition
- Network Security & Cryptography, 1e, Bernard Menezes, Cengage Learning
- Willam Stallings, “Cryptography and Network Security: Principles and Practice”, 3rd ed., Prentice Hall PTR.,2003.
- Stallings, “W.Network security Essentials: Applications and standards”, Prentice Hall, 2000
- Behrouz A Forouzan, “Cryptography & Network Security” ,McGraw-Hill
- Cloud security and privacy by Tim Mather kumaraswamyoreilly