0% found this document useful (0 votes)
47 views1 page

Rajalakshmi Engineering College: Signature of Faculty Signature of HOD

This document contains the lesson plan for a Cryptography and Network Security course taught over 5 units covering various topics in cryptography. The lesson plan lists 50 topics that will be covered across the 5 units, including conventional encryption techniques, public key cryptography, authentication, hash functions, and network and system level security tools and applications. It also lists the textbook and references that will be used for the course.

Uploaded by

suganya004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views1 page

Rajalakshmi Engineering College: Signature of Faculty Signature of HOD

This document contains the lesson plan for a Cryptography and Network Security course taught over 5 units covering various topics in cryptography. The lesson plan lists 50 topics that will be covered across the 5 units, including conventional encryption techniques, public key cryptography, authentication, hash functions, and network and system level security tools and applications. It also lists the textbook and references that will be used for the course.

Uploaded by

suganya004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 1

RAJALAKSHMI ENGINEERING COLLEGE 21 Random Number Generation T220-T227

LESSON PLAN 22 Public key cryptography principles of Public T259-T268


Faculty Name J.CHITRA Faculty Code IT37 key cryptosystems
Subject Name Cryptography and Network Security Subject code IT1352 23 The RSA Algorithm. T268-T278
Class III Year IT A & B Sec Date of Compilation 16/11/2007 UNIT-III AUTHENTICATION AND HASH FUNCTION Actual 9 hrs. Planned 11 hrs.
DEFINITION 24 Authentication Requirements T312- T313
25 Authentication functions T313- T324
To understand the principles of encryption algorithms; conventional and public key cryptography. To
26 Message Authentication codes T324- T328
have a detailed knowledge about authentication, hash functions and application level security 27 Hash functions T328- T334
mechanisms. 28 Security of Hash Functions and MACs T335- T338
29 MD5 Message Digest Algorithm T348- T357
OBJECTIVES
To know the methods of conventional encryption. 30 Secure Hash Algorithm. T357- T364
To understand the concepts of public key encryption and number theory 31 RIPEMD T365- T372
To understand authentication and Hash functions. 32 HMAC Digital Signature T372- T376
To know the network security tools and applications. 33 Authentication Protocols T384- T391
To understand the system level security used. 34 Digital Signatures Standard T392- T395
UNIT-IV NETWORK SECURITY Actual 8 hrs. Planned 8 hrs.
S.No Date Period Topic Page No 35 Authentication Applications: Kerberos T402- T419
UNIT- I INTRODUCTION Actual 10 hrs. Planned-11hrs. 36 X.509 Authentication Services T419- T428
1 OSI Security Architecture T7- T14 37 Electronic Mail Security-PGP T436- T455
2 Classical Encryption Techniques T23-T30 38 S/MIME T455- T472
Symmetric cipher model 39 IP Security Overview-Architecture T482- T491
Substitution Techniques 40 Authentication Header-ESP T491-T501
3 Transportation Techniques T44- T47 41 Combining Security Payload-Key mgmt. T501-T515
Rotar Machines Steganography
42 Web Security T528- T560
4 Cipher principles T63- T72
UNIT V SYSTEM LEVEL SECURITY Actual 8 hrs. Planned 8 hrs.
5 Data encryption standard T72- T81
43 Intrusion Detection T569- T581
6 Block Cipher Design Principles and T63
44 Intrusion Detection Techniques T569- T581
Modes of operation T91- T98
45 Password Management T581- T591
7 Evaluation criteria for AES T140- T143
46 Viruses and related Threats T598- T609
8 AES cipher T143- T167 47 Virus counter measures T609- T613
48 Firewall Design Principles T616- T628
9 Triple DES T174- T179 49 Firewall Design Principles T616- T628
10 Placement of Encryption Function T202- T210 50 Trusted Systems. T628- T634

11 Traffic confidentiality T210- T211 TEXT BOOK


UNIT-II PUBLIC KEY CRYPTOGRAPHY Actual 10 hrs. Planned 12 hrs. 1. William Stallings, Cryptography And Network Security Principles and
12 Key Management T286- T293 Practices, Prentice Hall of India, Third Edition, 2003.

13 Diffie Hellman key Exchange T293- T296 REFERENCES

14 Elliptic Curve Architecture and Cryptography T304- T308


1. Atul Kahate, Cryptography and Network Security, Tata McGraw-Hill, 2003.
15 Introduction to Number theory Prime T236-T239 2. Bruce Schneier, Applied Cryptography, John Wiley & Sons Inc, 2001.
numbers 3. Charles B. Pfleeger, Shari Lawrence Pfleeger, Security in Computing, Third
16 Fermats and Eulers Theorems T239- T243 Edition, Pearson Education, 2003.
17 Testing for Primality T243-T245
18 The Chinese Remainder Theorem-Discrete T245-T252
Logarithms
19 Confidentiality using symmetric Encryption T202-T211
20 20 Ke Key distribution T2 T211-T220

Signature of Faculty Signature of HOD

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy