Time
Session Teaching
Topics to be covered Propose Date Allocation
No Method
(min)
Process-to-Process delivery-connection oriented and
1 connection less service, reliable and unreliable service 50
Process to process delivery- flow control and
2 buffering ,multiplexing,crash recovery 50
Transmission Control Protocol (TCP)-service model,
3 protocol, segment header, connection management, 50
transmission policy
Cryptography-substitution ciphers,transposition
ciphers.symmetric key algorithms-DES,chaining BB/PPT
7 50
DES,Breaking DES
Public key algorithms-RSA and other algorithms
8 50
Digital signatures-secret key signatures, public key
9 signatures, message digests, Birthday attacks, 50
Management of public keys
Authentication protocols-based on a shared secret
10 key, establishing a shared key,Diffie-Hellman key
exchange
Authentication protocols-using key distribution 50
center, authentication using Kerberos, using public
11
key cryptography