Вы находитесь на странице: 1из 3

Lovely Professional University,Punjab

Format For Instruction Plan [for Courses with Labs

Course No CSE403P


Course Planner 15681 :: Sangeeta Sharma

Lectures Tutorial Practical Credits 0 0 2 1

Text Book:

1 Principles of Cryptography, William Stallings, Pearson Education. 5th edition.

Other Specific Book:

2 Security in Computing (Second Edition)', Charles P.Pfleeger, 1996, Prentice Hall International, Inc. 3 Cryptography & Network Security, Atul Kahate, TMH 4 Cryptography & Security , C K Shyamala, N Harini and Dr T R Padmanabhan 2011 ,Wiley-India 5 Applied Cryptography: Protocols, Algorithms, and Source Code in C, Bruce Schneier, John Wiley and Sons 6 Firewalls and Internet Security, Bill Cheswick and Steve Bellovin, Addison-Wesley 7 Security Technologies for the world wide web, Rolf Oppliger, Artech House, Inc.

Other Reading Sr No Jouranls atricles as compulsary readings (specific articles, Complete reference) 8 Bellovin. S. and Cheswick W. Network Firewalls, IEEE communication Magazine 9 Jurisic, A. And Menezes, A. Elliptical curves & Cryptography, Dr. Dobbs Journals 10 Chess, D. The Future of viruses on the internet. Proceedings, virus bulletin International conference 11 Anderson, J. Computer security Threat monitoring and surveillance. Fort Washington, P.A.James P. Anderson Co. Relevant Websites

Approved for Spring Session 2011-12

Sr. No. (Web adress) (only if relevant to the courses) 12 http://www.rsa.com/rsalabs/node.asp?id=2262 13 http://people.csail.mit.edu/rivest/Rsapaper.pdf

Salient Features Key management and its uses Digital signature and its purpose to use

*Each experiment of the lab will be evaluated using following relative scheme:
Component J/E WR VIVA % of Marks 50 20 30

List of experiments :Lecture Number Program 1 Program 2 Program 3 Program 4 Program 5 Program 6 Lecture Topic Pedagogical Tools Or Equipment Planned lab Manual Not Applicable Not Applicable Not Applicable Not Applicable Not Applicable Not Applicable

Encryption/Decryption using Caeser Cipher Technique. C/C++ Encryption/Decryption using Monoalphabetic Cipher Technique. Encryption/Decryption using Hill Cipher Technique. Encryption/Decryption using Polyalphabetic Cipher Technique. Encryption/Decryption using One time pad technique. C/C++

Encryption/Decryption using Playfair Cipher Technique. C/C++ C/C++ C/C++ C/C++

Mid Term
Program 7 Program 8 Program 9 Program 10 Encryption/Decryption using Data Encryption Standard C/C++ (Up to Expansion Permutation Step). Encryption/Decryption using DES (Cont. from last program). Encryption/Decryption using Advanced Encryption Standard (Up to Key expansion step). Encryption/Decryption using AES (Cont. from last program). C/C++ C/C++ C/C++ Not Applicable Not Applicable Not Applicable Not Applicable

Approved for Spring Session 2011-12

Program 11

Encryption/Decryption using RSA techniqe.


Not Applicable

Spill Over
Program 12 Program 13 Not Applicable Not Applicable

Approved for Spring Session 2011-12