Академический Документы
Профессиональный Документы
Культура Документы
(NIT-701)
Semester:-VII,
Session:-2018-19
Course Objectives:
This course gives the introduction and concepts of Network Security and
Cryptography to secure the network over unreliable environment. The objectives of
this course can be illustrated as:
Course Outcome
The Fundamental of Network Security program gives students the chance to develop the
technical skills necessary to fully manage sophisticated and vulnerable computer network
environments. Students will have the skill sets needed to handle the day-to-day
troubleshooting problems for securing the networks of all sizes. After completion of this
course, students will be able to:
Manage multiple operating systems, systems software, network services and security.
Evaluate and compare systems software and emerging technologies.
Develop solutions for networking and security problems, balancing business
concerns, technical issues, and security.
Explain concepts and theories of networking and apply them to various situations,
classifying networks, analyzing performance, and implementing new technologies.
Identify Infrastructure components and the roles they serve.
Design infrastructure including devices, topologies, protocols, systems
software, management, and security.
Effectively communicate technical information verbally, in writing, and in
presentations.
Use appropriate resources to stay abreast of the latest industry tools and techniques
analyzing the impact on existing systems and applying to future situations.
Explain the concepts of Confidentiality, Availability, and Integrity in Information
Assurance, including physical, software, devices, policies, and people. Analyze
these factors in an existing system and design implementations.
Cite and comply with relevant industry and organizational codes of conduct and
ethics.
Syllabus
Unit-I
Introduction to security attacks, services and mechanism, Classical encryption techniques-
substitution ciphers and transposition ciphers, cryptanalysis, steganography, Stream and
block ciphers. Modern Block Ciphers: Block ciphers principles, Shannon’s theory of
confusion and diffusion, fiestal structure, Data encryption standard (DES), Strength of DES,
Idea of differential cryptanalysis, block cipher modes of operations, Triple DES
Unit-II
Introduction to group, field, finite field of the form GF(p), modular arithmetic, prime and
relative prime numbers, Extended Euclidean Algorithm, Advanced Encryption Standard
(AES) encryption and decryption Fermat’s and Euler’s theorem, Primarily testing, Chinese
Remainder theorem, Discrete Logarithmic Problem, Principals of public key crypto systems,
RSA algorithm, security of RSA
Unit-III
Message Authentication Codes: Authentication requirements, authentication functions,
message authentication code, hash functions, birthday attacks, security of hash functions,
Secure hash algorithm (SHA) Digital Signatures: Digital Signatures, Elgamal Digital
Signature Techniques, Digital signature standards (DSS), proof of digital signature algorithm
Unit-IV
Key Management and distribution: Symmetric key distribution, Diffie-Hellman Key
Exchange, Public key distribution, X.509 Certificates, Public key Infrastructure.
Authentication Applications: Kerberos, Electronic mail security: pretty good privacy (PGP),
S/MIME.
Unit-V
IP Security: Architecture, Authentication header, Encapsulating security payloads,
combining security associations, key management. Introduction to Secure Socket Layer,
Secure electronic, transaction (SET) System Security: Introductory idea of Intrusion,
Intrusion detection, Viruses and related threats, firewalls
Text Books
Behrouz A. Frouzan: Cryptography and Network Security, Tata McGraw Hill
William Stallings, “Cryptography and Network Security: Principals and Practice”, Pearson
Education.
TimeTable
1 2 3 4 5 6 7 8 9
Days/Period
9:30 10:20 11:10 12:00 12:50 1:40 2:20 3:20 4:10
Mon CNS
Tue CNS
Wed CNS
Thu CNS
Fri CNS
Lecture Plan
Steganography
47
6 Stream And Block Stream and Block Ciphers William Stallings/ 63
Ciphers,
Simplified Des
Block Cipher Principles 56
7 Block Cipher Principles Fiestel Cipher William Stallings/ 64,
DES 72
Counter mode 97
12 Confidentiality using Placement of Encryption function William Stallings/ 202
conventional Encryption
Discrete Logarithms
248
19 Principles of Public Key Principles of Public Key William Stallings/ 259
Cryptography Cryptography
20 RSA Algorithm RSA, William Stallings/ 268
22 Key Management Public key distribution of secret keys William Stallings/ 291
Architecture 485
38 Authentication Header William Stallings/ 491
Trusted systems
628
Department of Computer Science & Engineering
IEC Group of Institutions, Greater Noida