Anda di halaman 1dari 5

L.P.No.

LESSON PLAN IT2352 Cryptography and Network Security Date Page

: : 14.12.12 : 1 0f 5

Subject Code : IT2352

UNIT TITLE : UNIT I OBJECTIVE : To understand the principles of encryption algorithms; conventional and public key cryptography S.No. 1 2 3 4 5 6 7 8 9. 10. 11. SUBJECT TOPIC Security Trends Attack and Services Classical Crypto Systems Different types of Ciphers LFSR Sequence Basic Number Theory Congruences CRT Modular Exponentiation Fermat and Eulers Theorem Jacobi Symbols,Finite fields PERIODS 1 1 1 1 2 1 1 2 1 1 1 REFERENCE MATERIAL T2 T2 T2 T2 T2 T1 T2 T1 T1 T1 T1
Serial Numbers 18

Suggested References (Name of the Book, Authors, Publisher and year of Publication) T1 : Wade Trappe Introduction to cryptography with coding theory, Second Edition, Pearson Education 2007 T2 : William Stallings, Cryptography and Network Security, Fourth Edition, Pearson Education 2006

Teaching Aids
OHP Models Simulation by Computer

Serial Numbers

L.P.No. LESSON PLAN IT2352 Cryptography and Network Security Date Page

: : 14.12.12 : 2 0f 5

Subject Code : IT2352

UNIT TITLE : UNIT II. OBJECTIVE : To understand the concepts of public key encryption and number theory S.No. 1 2 3 4 5 6 7 8. 9. SUBJECT TOPIC Simple DES Differential Cryptoanalysis DES Modes of Operation Triple DES AES RC4 and RSA Primality Test Factoring PERIODS 2 2 1 1 1 2 2 1 1 REFERENCE MATERIAL T2 T2 T2 T2 T2 T2 T2 T2 T2 Serial Numbers 17

Suggested References (Name of the Book, Authors, Publisher and year of Publication)
T1 : Wade Trappe Introduction to cryptography with coding theory, Second Edition, Pearson Education 2007 T2 : William Stallings, Cryptography and Network Security, Fourth Edition, Pearson Education 2006

Teaching Aids OHP Models Simulation by Computer

Serial Numbers

L.P.No. LESSON PLAN

Subject Code : IT2352

Date IT2352 Cryptography and Network Security Page

: 14.12.12 : 3 0f 5

UNIT TITLE : UNIT III OBJECTIVE : To understand authentication and Hash functions. S.No. SUBJECT TOPIC PERIODS 1 2 3 4 5 6 7 8 9 10 Discrete Logarthims Computing discrete logs Diffie-Hellman Key Exchange Elgamal public Key Exchange Hash Function Secure Hash Birthday Attacks MD5 Digital Signatures RSA,DSA 1 2 2 1 1 2 1 2 2 1

REFERENCE MATERIAL T2 T2 T2 T2 T2 T2 T2 T2 T2 T2 Serial Numbers 1 10

Suggested References (Name of the Book, Authors, Publisher and year of Publication)
T1 : Wade Trappe Introduction to cryptography with coding theory, Second Edition, Pearson Education 2007 T2 : William Stallings, Cryptography and Network Security, Fourth Edition, Pearson Education 2006

Teaching Aids OHP Models Simulation by Computer

Serial Numbers

L.P.No. LESSON PLAN IT2352 Cryptography and Network Security Date Page

: : 14.12.12 : 4 0f 5

Subject Code : IT2352

UNIT TITLE : UNIT IV OBJECTIVE : To know the network security tools and applications S.No. SUBJECT TOPIC PERIODS 1 Authentication Application 1

REFERENCE MATERIAL T2

2 3 4 5 6 7 8 9 10

Kerberos X.509 Electronics Mail Security S/MIME IP Security Web Security SSL TLS SET

2 1 1 1 2 2 1 1 1

T2 T2 T2 T2 T2 T2 T2 T2 T2 Serial Numbers 1 10

Suggested References (Name of the Book, Authors, Publisher and year of Publication)
T1 : Wade Trappe Introduction to cryptography with coding theory, Second Edition, Pearson Education 2007 T2 : William Stallings, Cryptography and Network Security, Fourth Edition, Pearson Education 2006

Teaching Aids OHP Models Simulation by Computer

Serial Numbers

L.P.No. LESSON PLAN IT2352 Cryptography and Network Security Date Page

: : 14.12.12 : 5 0f 5

Subject Code : IT2352

UNIT TITLE :UNIT V OBJECTIVE : To understand the system level security used. S.No. SUBJECT TOPIC PERIODS 1 2 3 4 5 6 7 System Security Intruders Malicious Software Viruses Firewall Firewall Architecture Security Standards 1 1 1 2 2 1 1

REFERENCE MATERIAL

T2 T2 T2 T2 T2 T2 T2 Serial Numbers

Suggested References (Name of the Book, Authors, Publisher and year of Publication)

T1 : Wade Trappe Introduction to cryptography with coding theory, Second Edition, Pearson Education 2007 T2 : William Stallings, Cryptography and Network Security, Fourth Edition, Pearson Education 2006

17

Teaching Aids OHP Models Simulation by Computer Prepared By M.JothishKumar AP/IT Verified By S.RajKamal AP/IT

Serial Numbers

Name Designation Signature

Approved By Prof.M.Ravichandran HOD/IT

Anda mungkin juga menyukai