Anda di halaman 1dari 8

Lovely Professional University, Punjab

Course Code CSEP506 Course Category Course Title NETWORK SECURITY AND CRYPTOGRAPHY Courses with Research focus Course Planner 15681::Sangeeta Sharma Lectures 2.0 Tutorials Practicals Credits 0.0 0.0 3.0

TextBooks Sr No T-1 Title Cryptography and Network Security Reference Books Sr No R-1 R-2 R-3 R-4 Other Reading Sr No OR-1 OR-2 OR-3 OR-4 Journals articles as Compulsary reading (specific articles, complete reference) Bellovin. S. and Cheswick W. ,Network Firewalls, IEEE communication Magazine , Jurisic A. and Menezes A. ,Elliptical curves & Cryptography, Dr. Dobbs Journals , Chess D., The Future of viruses on the internet. Proceedings, virus bulletin International conference , Anderson J., Computer security Threat monitoring and surveillance, Fort Washington, P.A.James P. Anderson Co. , Title Cryptography and Network Security Cryptography & Security Cryptography and Network Security Applied Cryptography Author Behrouz Forouzan, Debdeep Mukhopadhyay C K Shyamala, N Harini and Dr T R Padmanabhan Atul Kahate Bruce Schneier Edition 2nd 1st 1st 2nd Year 2010 2011 2007 Publisher Name Mc graw Hill Wiley Tata McGraw Hill Wiley Author William Stallings Edition 5th Year 2011 Publisher Name Pearson Education

Relevant Websites Sr No RW-1 RW-2 RW-3 RW-4 (Web address) (only if relevant to the course) http://fag.grm.hia.no/IKT7000/litteratur/paper/x800.pdf http://www.rsa.com/rsalabs/node.asp?id=2262 http://people.csail.mit.edu/rivest/Rsapaper.pdf http://nptel.iitm.ac.in/courses/106105031/ Salient Features OSI security architecture of different layers Key management and its uses Digital signature and its purpose to use Video Lecture

LTP week distribution: (LTP Weeks) Weeks before MTE 10

Weeks After MTE Spill Over

10 1

Detailed Plan For Lectures


Week Number Lecture Number Broad Topic(Sub Topic) Chapters/Sections of Text/reference books Other Readings, Lecture Description Relevant Websites, Audio Visual Aids, software and Virtual Labs OR-4 RW-4 Learning Outcomes Pedagogical Tool Demonstration/ Case Study / Images / animation / ppt etc. Planned

Week 1

Lecture 1

Overview(Computer Security Concepts, Security Attacks, Security Services) Overview(Computer Security Concepts, Security Attacks, Security Services) Classical Encryption Techniques and Block Ciphers(Symmetric Cipher Model,Substitution Techniques, Block Cipher Principles, The Data Encryption Standard, DES Example.) Classical Encryption Techniques and Block Ciphers(Symmetric Cipher Model,Substitution Techniques, Block Cipher Principles, The Data Encryption Standard, DES Example.) Classical Encryption Techniques and Block Ciphers(Symmetric Cipher Model,Substitution Techniques, Block Cipher Principles, The Data Encryption Standard, DES Example.) Classical Encryption Techniques and Block Ciphers(Symmetric Cipher Model,Substitution Techniques, Block Cipher Principles, The Data Encryption Standard, DES Example.)

T-1:1- 1.1 1.2 1.3 1.4 1.5

Introduction to Network Students will get Images from slides and security. knowledge about video lectures can be various security attacks used. and services. Introduction to Network Students will get Images from slides and security. knowledge about video lectures can be various security attacks used. and services. To teach about the various substitution techniques and working of block ciphers along with DES. To teach about the various substitution techniques and working of block ciphers along with DES. To teach about the various substitution techniques and working of block ciphers along with DES. To teach about the various substitution techniques and working of block ciphers along with DES. Students will learn about the substitution techniques and block ciphers. Images from slides and video lectures can be used.

Lecture 2

T-1:1- 1.1 1.2 1.3 1.4 1.5

OR-4 RW-4

Week 2

Lecture 3

T-1:2- 2.1 2.2 2.3

RW-4

Lecture 4

T-1:2- 2.1 2.2 2.3

RW-4

Students will learn about the substitution techniques and block ciphers.

Images from slides and video lectures can be used.

Week 3

Lecture 5

T-1:2- 2.1 2.2 2.3

RW-4

Students will learn about the substitution techniques and block ciphers.

Images from slides and video lectures can be used.

Lecture 6

T-1:2- 2.1 2.2 2.3

RW-4

Students will learn about the substitution techniques and block ciphers.

Images from slides and video lectures can be used.

Week 4

Lecture 7

Basic Concepts in Number Theory T-1:4- 4.1 4.2 4.3 4.4 and Finite Fields(Divisibility and 4.5 4.6 4.7 the Division Algorithm Algorithm, The Euclidean Algorithm, Modular Arithmetic.)

RW-4

To provide knowledge of Students will learn number theory and about the mathematics algorithms used for used in cryptography. calculations in cryptography.

Images from slides and video lectures can be used.

Week 4

Lecture 8

Basic Concepts in Number Theory T-1:4- 4.1 4.2 4.3 4.4 and Finite Fields(Divisibility and 4.5 4.6 4.7 the Division Algorithm Algorithm, The Euclidean Algorithm, Modular Arithmetic.) Basic Concepts in Number Theory T-1:4- 4.1 4.2 4.3 4.4 and Finite Fields(Divisibility and 4.5 4.6 4.7 the Division Algorithm Algorithm, The Euclidean Algorithm, Modular Arithmetic.) Basic Concepts in Number Theory T-1:4- 4.1 4.2 4.3 4.4 and Finite Fields(Divisibility and 4.5 4.6 4.7 the Division Algorithm Algorithm, The Euclidean Algorithm, Modular Arithmetic.) Advanced Encryption Standard (AES Structure, AES Transformation Functions, AES Key Expansion, AES Example) Advanced Encryption Standard (AES Structure, AES Transformation Functions, AES Key Expansion, AES Example) Block Cipher Operation and Stream Ciphers(Electronic Code Book, Cipher Block Chaining Mode, Cipher Feedback Mode, Output Feedback Mode, Counter Mode, Stream Ciphers and RC4) Introduction to Number Theory (Prime Numbers, Fermat's and Euler's Theorem) T-1:5- 5.2 5.3 5.4

RW-4

To provide knowledge of Students will learn number theory and about the mathematics algorithms used for used in cryptography. calculations in cryptography. To provide knowledge of Students will learn number theory and about the mathematics algorithms used for used in cryptography. calculations in cryptography. To provide knowledge of Students will learn number theory and about the mathematics algorithms used for used in cryptography. calculations in cryptography. To teach about the Students will learn functioning of AES with about the AES example. processing. To teach about the Students will learn functioning of AES with about the AES example. processing. To teach the various modes of operations of block ciphers using appropriate diagrams. Students will learn about Block ciphers modes f operation and will understand the difference between them.

Images from slides and video lectures can be used.

Week 5

Lecture 10

RW-4

Images from slides and video lectures can be used.

Lecture 9

RW-4

Images from slides and video lectures can be used.

Week 6

Lecture 11

RW-4

Images from slides and video lectures can be used. Images from slides and video lectures can be used. Images from slides and video lectures can be used.

Lecture 12

T-1:5- 5.2 5.3 5.4

RW-4

Week 7

Lecture 13

T-1:6- 6.1 6.2 6.3 6.4 6.5 6.6

RW-4

Lecture 14

T-1:8- 8.1 8.2

RW-4

To teach the concepts of Students will learn Images from slides and number theory used in about the basic video lectures can be cryptography. mathematical theorems used. used in cryptography. Term Paper,Quiz,Test1 To teach the concepts of Students will learn public key cryptography about the difference and related algorithms. between public and private key cryptography. To teach about hash functions, their uses and example algorithm used to generate hash code. Images from slides and video lectures can be used.

Week 8

Lecture 15 Lecture 16 Public-Key Cryptography and T-1:9- 9.1 9.2; 10 RSA, Other Public-Key 10.1 Cryptosystems(Principles of Public Key Cryptosystems, RSA Algorithm, Diffie Hellman Key Exchange.) Cryptographic Hash Functions (Applications of Cryptographic Hash Functions, Requirements and Security, Secure Hash Algorithm , SHA-3) T-1:11- 11.1 11.5 RW-4

Week 9

Lecture 17

RW-4

Students will learn the Images from slides and use and importance of video lectures can be hash codes in electronic used. world.

Week 9

Lecture 18

Cryptographic Hash Functions (Applications of Cryptographic Hash Functions, Requirements and Security, Secure Hash Algorithm , SHA-3) Cryptographic Hash Functions (Applications of Cryptographic Hash Functions, Requirements and Security, Secure Hash Algorithm , SHA-3) Cryptographic Hash Functions (Applications of Cryptographic Hash Functions, Requirements and Security, Secure Hash Algorithm , SHA-3)

T-1:11- 11.1 11.5

RW-4

To teach about hash functions, their uses and example algorithm used to generate hash code. To teach about hash functions, their uses and example algorithm used to generate hash code. To teach about hash functions, their uses and example algorithm used to generate hash code.

Students will learn the Images from slides and use and importance of video lectures can be hash codes in electronic used. world. Students will learn the Images from slides and use and importance of video lectures can be hash codes in electronic used. world. Students will learn the Images from slides and use and importance of video lectures can be hash codes in electronic used. world.

Week 10

Lecture 19

T-1:11- 11.1 11.5

RW-4

Lecture 20

T-1:11- 11.1 11.5

RW-4

MID-TERM
Week 11 Lecture 21 Digital Signatures(Digital Signatures, Elagamal Digital Signature Scheme) T-1:13- 13.1 13.2 RW-2 RW-3 RW-4 To teach about the uses of Digital signatures in cryptography and an example of algorithm used to generate digital signature. To teach about the uses of Digital signatures in cryptography and an example of algorithm used to generate digital signature. To teach about the uses of Digital signatures in cryptography and an example of algorithm used to generate digital signature. To teach about the uses of Digital signatures in cryptography and an example of algorithm used to generate digital signature. To teach about the uses of Digital signatures in cryptography and an example of algorithm used to generate digital signature. Students will learn the Images from slides and generation of digital video lectures can be signatures and its used. importance in electronic world. Students will learn the Images from slides and generation of digital video lectures can be signatures and its used. importance in electronic world. Students will learn the Images from slides and generation of digital video lectures can be signatures and its used. importance in electronic world. Students will learn the Images from slides and generation of digital video lectures can be signatures and its used. importance in electronic world. Students will learn the Images from slides and generation of digital video lectures can be signatures and its used. importance in electronic world.

Lecture 22

Digital Signatures(Digital Signatures, Elagamal Digital Signature Scheme)

T-1:13- 13.1 13.2

RW-2 RW-3 RW-4

Week 12

Lecture 23

Digital Signatures(Digital Signatures, Elagamal Digital Signature Scheme)

T-1:13- 13.1 13.2

RW-2 RW-3 RW-4

Lecture 24

Digital Signatures(Digital Signatures, Elagamal Digital Signature Scheme)

T-1:13- 13.1 13.2

RW-2 RW-3 RW-4

Week 13

Lecture 25

Digital Signatures(Digital Signatures, Elagamal Digital Signature Scheme)

T-1:13- 13.1 13.2

RW-2 RW-3 RW-4

Week 13

Lecture 26

Digital Signatures(Digital Signatures, Elagamal Digital Signature Scheme)

T-1:13- 13.1 13.2

RW-2 RW-3 RW-4

To teach about the uses of Digital signatures in cryptography and an example of algorithm used to generate digital signature. To teach about the uses of Digital signatures in cryptography and an example of algorithm used to generate digital signature. Term Paper,Quiz,Test2 To teach about security requirements in emails and how it is provided along with the importance of IPSec. To teach about security requirements in emails and how it is provided along with the importance of IPSec. To teach about security requirements in emails and how it is provided along with the importance of IPSec. To teach about security requirements in emails and how it is provided along with the importance of IPSec. To teach about security requirements in emails and how it is provided along with the importance of IPSec. To teach about the generation and distribution of public keys and symmetric keys as well as their management.

Students will learn the Images from slides and generation of digital video lectures can be signatures and its used. importance in electronic world. Students will learn the Images from slides and generation of digital video lectures can be signatures and its used. importance in electronic world.

Week 14

Lecture 27

Digital Signatures(Digital Signatures, Elagamal Digital Signature Scheme)

T-1:13- 13.1 13.2

RW-2 RW-3 RW-4

Lecture 28 Week 15 Lecture 29 Electronic Mail Security, IP Security(Pretty Good Privacy, IP Security Overview and Policy, Encapsulating Security Payload, Combining Security Associations) Electronic Mail Security, IP Security(Pretty Good Privacy, IP Security Overview and Policy, Encapsulating Security Payload, Combining Security Associations) Electronic Mail Security, IP Security(Pretty Good Privacy, IP Security Overview and Policy, Encapsulating Security Payload, Combining Security Associations) Electronic Mail Security, IP Security(Pretty Good Privacy, IP Security Overview and Policy, Encapsulating Security Payload, Combining Security Associations) Electronic Mail Security, IP Security(Pretty Good Privacy, IP Security Overview and Policy, Encapsulating Security Payload, Combining Security Associations) T-1:18- 18.1; 1919.1 19.2 19.3 19.4 RW-4

Students will learn about the various methods of providing security in online data transmissions done by them. Students will learn about the various methods of providing security in online data transmissions done by them. Students will learn about the various methods of providing security in online data transmissions done by them. Students will learn about the various methods of providing security in online data transmissions done by them. Students will learn about the various methods of providing security in online data transmissions done by them. Students will learn the difference between symmetric keys and asymmetric key cryptography.

Images from slides and video lectures can be used.

Lecture 30

T-1:18- 18.1; 1919.1 19.2 19.3 19.4

RW-4

Images from slides and video lectures can be used.

Week 16

Lecture 31

T-1:18- 18.1; 1919.1 19.2 19.3 19.4

RW-4

Images from slides and video lectures can be used.

Lecture 32

T-1:18- 18.1; 1919.1 19.2 19.3 19.4

RW-4

Images from slides and video lectures can be used.

Week 17

Lecture 33

T-1:18- 18.1; 1919.1 19.2 19.3 19.4

RW-4

Images from slides and video lectures can be used.

Lecture 34

Key Management and Distribution, T-1:14- 14.1 14.2 User Authentication(Distribution 14.3 14.4; 15- 15.1 of symmetric keys using 15.2 15.3 symmetric encryption and asymmetric encryption, Distribution of Public Keys.)

RW-4

Images from slides and video lectures can be used.

Week 18

Lecture 35

Key Management and Distribution, T-1:14- 14.1 14.2 User Authentication(Distribution 14.3 14.4; 15- 15.1 of symmetric keys using 15.2 15.3 symmetric encryption and asymmetric encryption, Distribution of Public Keys.) Key Management and Distribution, T-1:14- 14.1 14.2 User Authentication(Distribution 14.3 14.4; 15- 15.1 of symmetric keys using 15.2 15.3 symmetric encryption and asymmetric encryption, Distribution of Public Keys.) Key Management and Distribution, T-1:14- 14.1 14.2 User Authentication(Distribution 14.3 14.4; 15- 15.1 of symmetric keys using 15.2 15.3 symmetric encryption and asymmetric encryption, Distribution of Public Keys.) Key Management and Distribution, T-1:14- 14.1 14.2 User Authentication(Distribution 14.3 14.4; 15- 15.1 of symmetric keys using 15.2 15.3 symmetric encryption and asymmetric encryption, Distribution of Public Keys.) Key Management and Distribution, T-1:14- 14.1 14.2 User Authentication(Distribution 14.3 14.4; 15- 15.1 of symmetric keys using 15.2 15.3 symmetric encryption and asymmetric encryption, Distribution of Public Keys.) Key Management and Distribution, T-1:14- 14.1 14.2 User Authentication(Distribution 14.3 14.4; 15- 15.1 of symmetric keys using 15.2 15.3 symmetric encryption and asymmetric encryption, Distribution of Public Keys.)

RW-4

To teach about the generation and distribution of public keys and symmetric keys as well as their management. To teach about the generation and distribution of public keys and symmetric keys as well as their management. To teach about the generation and distribution of public keys and symmetric keys as well as their management. To teach about the generation and distribution of public keys and symmetric keys as well as their management. To teach about the generation and distribution of public keys and symmetric keys as well as their management. To teach about the generation and distribution of public keys and symmetric keys as well as their management.

Students will learn the difference between symmetric keys and asymmetric key cryptography. Students will learn the difference between symmetric keys and asymmetric key cryptography. Students will learn the difference between symmetric keys and asymmetric key cryptography. Students will learn the difference between symmetric keys and asymmetric key cryptography. Students will learn the difference between symmetric keys and asymmetric key cryptography. Students will learn the difference between symmetric keys and asymmetric key cryptography.

Images from slides and video lectures can be used.

Lecture 36

RW-4

Images from slides and video lectures can be used.

Week 19

Lecture 37

RW-4

Images from slides and video lectures can be used.

Lecture 38

RW-4

Images from slides and video lectures can be used.

Week 20

Lecture 39

RW-4

Images from slides and video lectures can be used.

Lecture 40

RW-4

Images from slides and video lectures can be used.

SPILL OVER
Week 11 Lecture 21 Spill Over

Scheme for CA:


Component Term Paper,Quiz,Test Frequency 2 Total :Out Of 3 Each Marks Total Marks 10 10 20 20

Details of Academic Task(s)

AT No.

Objective

Topic of the Academic Task

Nature of Academic Task (group/individuals/field work Individual

Evaluation Mode

Allottment / submission Week 4 / 15

Term Paper1

Understanding how A topic will be assigned to each student on which proper study to write a technical will be carried out by the students and the conclusions will be paper. presented in the form of a technical paper.

Based on the student's performance in the completion of the term paper. Evaluation on the basis of performance of the students in the quiz Evaluation on the basis of performance of the student in the test.

Quiz1

To test the knowledge of students based on the lectures taught till lecture 10. To test the knowledge of students based on the lectures taught till lecture 19.

A quiz that consists multiple choice questions, fill in the blanks Individual and one work answers. Multiple set of questions must be prepared to avoid cheating during the quiz.

7/8

Test1

A test that consists short answer type and long answer type questions.

Individual

12 / 13

List of suggested topics for term paper[at least 15] (Student to spend about 15 hrs on any one specified term paper) Sr. No. Topic 1 Advanced Encryption Standard 2 Diffie-Hellman Key Exchange 3 Elliptic Curve Cryptography 4 Block Ciphers and the Data Encryption Standard 5 Digital Signature Standard 6 Digital Signatures Authentication Protocols 7 Security Problems in the TCP/IP Protocol Suite 8 Privacy Enhancement for Internet Electronic Mail 9 Kerberos 10 Pretty Good Privacy 11 IP Security Architecture 12 Secure Electronic Transaction 13 Secure Socket Layer 14 Language based security 15 Block Cipher Design Principles 16 Message Authentication 17 The Code Red Worm

18 Academic Freedom and the Hacker Ethic 19 SNORT Intrusion Detection System 20 Achieving Electronic Privacy 21 The tiny encryption algorithm 22 The Block Cipher Square 23 Tiger: A fast new hash function 24 Data Encryption Standard

Anda mungkin juga menyukai