Anda di halaman 1dari 3

ACADEMY OF TECHNOLOGY

ADECONAGAR, HOOGLY 712121

DEPARTMENT OF CSE

COURSE PLAN

Name of the Faculty : Subir Panja/Arindrajit Pal/ Soumadip Ghosh


Subject with code : Cryptography & Network Security (CS-801D/ IT-801D)
Semester / Branch : 8th Semester / (CSE/IT)
Credit : 3
Allotted Hrs : 45L

Syllabus
Module1: Attacks on Computers & Computer Security (3L+1T)
Introduction, Need for Security, Security approaches, Principles of Security, Types of attack.

Module2: Cryptography: Concepts & Techniques (5L+1T)


Introduction, Plaintext & Cipher text, Substitution Techniques, Transposition Techniques, Encryption &
Decryption, Symmetric & Asymmetric key Cryptography, Key Range & Key Size

Module3: Symmetric Key Algorithm (9L+1T)


Introduction, Algorithm types & Modes, Overview of Symmetric Key Cryptography, DES (Data Encryption
Standard) algorithm, IDEA (International Data Encryption Algorithm) algorithm, RC5 (Rivest Cipher 5)
algorithm.

Module4: Asymmetric Key Algorithm, Digital Signature and RSA (7L+1T)


Introduction, Overview of Asymmetric key Cryptography, RSA algorithm, Symmetric & Asymmetric key
Cryptography together, Digital Signature, Basic concepts of Message Digest and Hash Function
(Algorithms on Message Digest and Hash function not required).

Module5: Internet Security Protocols, User Authentication (8L+1T)


Basic Concepts, SSL protocol, Authentication Basics, Password, Authentication Token, Certificate based
Authentication, Biometric Authentication.

Module6 : Electronic Mail Security (2L+1T)


Basics of mail security, Pretty Good Privacy, S/MIME.

Module7: Firewall (4L+1T)


Introduction, Types of firewall, Firewall Configurations, DMZ Network
Objective: The purpose of the course is to provide a solid understanding of the main issues related to
security in modern networked computer systems. This covers underlying concepts and foundations of
computer security, basic knowledge about security-relevant decisions in designing IT infrastructures and
techniques to secure complex systems. The course will explore the International Standards Organizations
Open System Interconnection (ISO OSI) network stack and discuss common security weaknesses,
vulnerabilities, attack methods, and mitigation approaches.

Learning outcome: This course will provide a comprehensive list of security issues related to general
networking design and development including
1. Understand security concepts, Ethics in Network Security
2. Understand security threats, and the security services and mechanisms to counter them
3. Comprehend and apply relevant cryptographic techniques
4. Comprehend security services and mechanisms in the network protocol stack
5. Comprehend and apply authentication services and mechanisms
6. Comprehend and apply relevant protocol like SSL, SSH etc.
7. Comprehend and apply email security services and mechanisms
8. Comprehend and apply web security services and mechanisms
9. Comprehend computer and network access control.

1. Textbook:
T1. Cryptography and Network Security, Atul Kahate, TMH.
T2. Cryptography and Network Security, William Stallings, 2nd Edition, Pearson Education

2. References:
R1. Cryptography and Network Security, Behrouz A. Forouzan, Special Indian Edition, TMH.

3. E-Learning Courses for Reference (From NPTEL):


V1. http://nptel.ac.in/courses/106105031/ (Prof. Debdeep Mukhopadhyay IIT Kharagpur)

4. Detailed Plan for Lectures:

Lecture Topic Name No. of Name E-Learning


No. Lectures of the Courses
Book
MODULE I Attacks on Computers & Computer Security [3L+1T]
1. Introduction, Need for Security, Malicious Programs 1 T1,R1 V1- Lecture 1
2. Security approaches, Principles of Security 1 T1,R1 V1- Lecture 1
3. Types of attacks 1 T1,R1 V1- Lecture 1
4. TUTORIAL 1 - -
MODULE II - Cryptography: Concepts & Techniques [5L+1T]
5. Introduction, Plain text & Cipher text, Encryption & 1 T1, T2 V1- Lecture 5
Decryption
6. Symmetric & Asymmetric key Cryptography 1 T1, T2 V1- Lecture 5
7. Key Range & Key Size 1 T1, T2 V1- Lecture 5
8. Substitution Techniques 1 T1, T2 V1- Lecture 5
9. Transposition Techniques 1 T1, T2 V1- Lecture 5
10. TUTORIAL 1 - -
MODULE III - Symmetric Key Algorithm [9L+1T]
11. Introduction, Algorithm types & Modes 1 T1, T2 V1- Lecture 10
12. Overview of Symmetric Key Cryptography 1 T1, T2 V1- Lecture 10
13. Different types of Ciphers 1 T1, T2 V1- Lecture 10
14. Block Cipher Structure - Feistel Cipher 1 T2 -
15. Simplified DES (S-DES) 1 T2 -
16. Data Encryption Standard (DES) 1 T1, T2 V1- Lecture 11
17. Double DES (DES-2), Triple DES (DES-3) 1 T1, T2 V1- Lecture 11
18. International Data Encryption Algorithm (IDEA) 1 T1, T2 V1- Lecture 11
19. RC5 (Rivest Cipher 5) algorithm 1 T1 V1- Lecture 11
20. TUTORIAL 1 - -
MODULE IV - Asymmetric Key Algorithm, Digital Signature and RSA [7L+1T]
21. Introduction, Overview of Asymmetric Key 1 T1
Cryptography V1- Lecture 28
22. Diffie-Hellman key Exchange Algorithm 1 T1
23. The RSA Algorithm 1 T1 V1- Lecture 28
24. Symmetric and Asymmetric Key Cryptography 1 T1 -
Together: Digital Envelope
25. Message Digest 1 T1 V1- Lecture 23
26. Digital Signature, Digital Certificate 1 T1 V1- Lecture 26
27. Hash Function 1 T1 V1- Lecture 26
28. TUTORIAL 1 - -
MODULE V - Internet Security Protocols, User Authentication [8L+1T]
29. Basic Concepts, Secure Socket Layer (SSL) 1 T1
30. Transport Layer Security (TLS) 1 T1 V1- Lecture 39
31. Secure Hyper Text Transfer Protocol (SHTTP) 1 T1
32. Secure Electronic Transaction (SET), SSL Versus SET 1 T1
33. IP Security (IPSec) overview and architecture, AH, ESP T1, T2 -
34. Authentication Basics, Authentication Token, Certificate 1 T1 -
based Authentication
35. Password- protection and selection strategies 1 T2, T3 -
36. Biometric Authentication, Kerberos Motivation, 1 T1 V1- Lecture 23
Kerberos Version 4
37. TUTORIAL 1 - -
MODULE VI - Electronic Mail Security [2L+1T]
38. Basics of mail security, Pretty Good Privacy (PGP) 1 T1,T2 V1- Lecture 23
39. Secure/Multipurpose Internet Mail Extensions (S/MIME) 1 T1,T2
40. TUTORIAL 1 - -
MODULE VII Firewall [4L+1T]
41. Brief Introduction to TCP/IP 1 T1 V1- Lecture 40
42. IP Datagram 1 T1 V1- Lecture 40
43. Introduction, Types of firewall 1 T1 V1- Lecture 40
44. Firewall Configurations, DMZ Network 1 T1,T2 V1- Lecture 40
45. TUTORIAL 1 - -

5. Portions for Internal Test I and II:

Sl. No. Test Module Number(s)


1 1st Internal I to III
2 2nd Internal IV to VII

----------------------------- ----------------------------- ----------------------------


Subir Panja Arindrajit Pal Soumadip Ghosh

Anda mungkin juga menyukai