0% found this document useful (0 votes)
167 views9 pages

CNS Course Plan - Iv C

This document provides a course plan for a Cryptography and Network Security course taught at DHANALAKSHMI SRINIVASAN ENGINEERING COLLEGE. The course covers 5 units over 45 contact hours: 1) Introduction to cryptography concepts, 2) Symmetric key cryptography techniques, 3) Public key cryptography techniques, 4) Message authentication and integrity, and 5) Security practices and system security. Each unit covers relevant topics from the textbook and breaks down the topics, reference materials, teaching methods, and number of periods required to teach the content. The course objectives are to understand cryptography theories, algorithms, and systems, and approaches to build protection mechanisms to secure computer networks.

Uploaded by

Mohana Subbu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
167 views9 pages

CNS Course Plan - Iv C

This document provides a course plan for a Cryptography and Network Security course taught at DHANALAKSHMI SRINIVASAN ENGINEERING COLLEGE. The course covers 5 units over 45 contact hours: 1) Introduction to cryptography concepts, 2) Symmetric key cryptography techniques, 3) Public key cryptography techniques, 4) Message authentication and integrity, and 5) Security practices and system security. Each unit covers relevant topics from the textbook and breaks down the topics, reference materials, teaching methods, and number of periods required to teach the content. The course objectives are to understand cryptography theories, algorithms, and systems, and approaches to build protection mechanisms to secure computer networks.

Uploaded by

Mohana Subbu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

DSEC/CSE/CS8792/ CRYPTOGRAPHY AND NETWORK SECURITY /IV/VII

DHANALAKSHMI SRINIVASAN ENGINEERING COLLEGE


PERAMBALUR-621212
COURSE PLAN
Name of the Faculty Mr.V.GOKULAKRISHNAN
Designation/Department AP/CSE
Course Code/Name CS8792/CRYPTOGRAPHY AND NETWORK SECURITY
Year/Section/Department IV/C/CSE
Credits Details L:3 T:0 P:0 C:3
Total Contact Hours Required 45
Syllabus:

UNIT I INTRODUCTION 9
Security trends - Legal, Ethical and Professional Aspects of Security, Need for Security at Multiple levels,
Security Policies - Model of network security – Security attacks, services and mechanisms – OSI security
architecture – Classical encryption techniques: substitution techniques, transposition techniques, steganography-
Foundations of modern cryptography: perfect security – information theory – product cryptosystem –
cryptanalysis.

UNIT II SYMMETRIC KEY CRYPTOGRAPHY 9

MATHEMATICS OF SYMMETRIC KEY CRYPTOGRAPHY: Algebraic structures - Modular arithmetic-


Euclid‟s algorithm- Congruence and matrices - Groups, Rings, Fields- Finite fields- SYMMETRIC KEY
CIPHERS: SDES – Block cipher Principles of DES – Strength of DES – Differential and linear cryptanalysis -
Block cipher design principles – Block cipher mode of operation – Evaluation criteria for AES – Advanced
Encryption Standard - RC4 – Key distribution.
UNIT III PUBLIC KEY CRYPTOGRAPHY 9
MATHEMATICS OF ASYMMETRIC KEY CRYPTOGRAPHY: Primes – Primality Testing – Factorization –
Euler„s totient function, Fermat„s and Euler„s Theorem - Chinese Remainder Theorem – Exponentiation and
logarithm - ASYMMETRIC KEY CIPHERS: RSA cryptosystem – Key distribution – Key management – Diffie
Hellman key exchange - ElGamal cryptosystem – Elliptic curve arithmetic-Elliptic curve cryptography.

UNIT IV MESSAGE AUTHENTICATION AND INTEGRITY 9


Authentication requirement – Authentication function – MAC – Hash function – Security of hash function and
MAC – SHA –Digital signature and authentication protocols – DSS- Entity Authentication: Biometrics,
Passwords, Challenge Response protocols- Authentication applications - Kerberos, X.509
UNIT V SECURITY PRACTICE AND SYSTEM SECURITY 9
Electronic Mail security – PGP, S/MIME – IP security – Web Security - SYSTEM SECURITY: Intruders –
Malicious software – viruses – Firewalls.

1
DSEC/CSE/CS8792/ CRYPTOGRAPHY AND NETWORK SECURITY /IV/VII

Objective:

OBJECTIVES:

 To understand Cryptography Theories, Algorithms and Systems.


 To understand necessary Approaches and Techniques to build protection mechanisms in order to secure
computer networks.
Text Book:

T1: William Stallings, Cryptography and Network Security: Principles and Practice, PHI 3rd Edition, 2006.

Reference Book:

R1: C K Shyamala, N Harini and Dr. T R Padmanabhan: Cryptography and Network Security, Wiley India
Pvt.Ltd
R2: BehrouzA.Foruzan, Cryptography and Network Security, Tata McGraw Hill 2007.
R3: Charlie Kaufman, Radia Perlman, and Mike Speciner, Network Security: PRIVATE Communication in a
PUBLIC World, Prentice Hall, ISBN 0-13-046019-2
Website:

W1: https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-033- computer-system-


engineering-spring-2009/video-lectures/ lecture by Prof. Robert Morris and Prof. Samuel Madden MIT

Online Mode of Study (if Any):

 http://nptel.ac.in/courses/106105031/lecture by Dr. Debdeep MukhopadhyayIIT Kharagpur


 https://www.coursera.org/learn/crypto#syllabus
Course Plan:

Topic Topic Reference Page Mode of Number of Cumulative


Number Detail Number teaching Periods Period
Required
UNIT I INTRODUCTION
Security trends, Legal, Ethical
1 and Professional Aspects of T1 6 PPT 1 1
Security
Need for Security at Multiple 8-9
2 T1 PPT 1 2
levels, Security Policies
3 Model of network security T1 22-23 BB 1 3
4 Security attacks T1 13-15 BB 1 4
5 Services and mechanisms T1 16-21 BB 1 5
6 OSI security architecture T1 12 BB 1 6
Classical encryption techniques: 28-48
7 T1 BB 1 7
substitution techniques
Transposition techniques, 49-54
8 T1 BB 1 8
steganography

2
DSEC/CSE/CS8792/ CRYPTOGRAPHY AND NETWORK SECURITY /IV/VII

Foundations of modern 32-33


cryptography: perfect security,
9 T1 PPT 1 9
information theory, product
cryptosystem, cryptanalysis.
Outcome of Unit I:
CO1: Understand the fundamentals of networks security, security architecture, threats and
vulnerabilities
UNIT II SYMMETRIC KEY CRYPTOGRAPHY
MATHEMATICS OF 30
SYMMETRIC KEY
10 T1 PPT 1 10
CRYPTOGRAPHY: Algebraic
structures
11 Modular arithmetic T1 101-106 PPT 1 11
Euclid‟s algorithm, Congruence 107-108
12 T1 PPT 1 12
and matrices
Groups, Rings, Fields,Finite
13 fields T1 BB 1 13
97-100
SYMMETRIC KEY CIPHERS:
14 SDES, Block cipher Principles T1 64-82 BB 1 14
of DES, Strength of DES
Differential and linear
15 cryptanalysis, Block cipher T1 83-89 PPT 1 15
design principles
16 Block cipher mode of operation T1 181-188 BB 1 16
Evaluation criteria for AES, 134-139
17 T1 BB 1 17
Advanced Encryption Standard
18 RC4, Key distribution. T1 189,210-217 BB 1 18
Outcome of Unit II:
CO 2:Apply the different cryptographic operations of symmetric cryptographic algorithms
UNIT III PUBLIC KEY CRYPTOGRAPHY
MATHEMATICS OF
19 ASYMMETRIC KEY T1 BB 1 19
236-237
CRYPTOGRAPHY: Primes
20 Primality Testing , Factorization T1 242-244 BB 1 20
Euler„s totient function,
21 Fermat„s and Euler„s Theorem T1 PPT 1 21
238-241
22 Chinese Remainder Theorem T1 245-246 PPT 1 22
23 Exponentiation and logarithm T1 247-250 BB 1 23
ASYMMETRIC KEY 268-270
24 CIPHERS: RSA cryptosystem, T1 BB 1 24
Key distribution
25 Key management T1 290-297 BB 1 25
Diffie Hellman key exchange, 298-300
26 T1 BB 1 26
ElGamal cryptosystem
Elliptic curve arithmetic, Elliptic 301-312
27 T1 PPT 1 27
curve cryptography
Outcome of Unit III:
3
DSEC/CSE/CS8792/ CRYPTOGRAPHY AND NETWORK SECURITY /IV/VII

CO 3:Apply the different cryptographic operations of public key cryptography


UNIT IV MESSAGE AUTHENTICATION AND INTEGRITY
28 Authentication requirement T1 319 PPT 1 28
29 Authentication function T1 320-330 PPT 1 29
30 MAC T1 331-333 BB 1 30
Hash function ,Security of hash 334-343
31 T1 BB 1 31
function and MAC
32 SHA T1 353-357 BB 1 32
Digital signature and 377-392
33 T1 BB 1 33
authentication protocols,DSS
Entity Authentication: 424-426
34 Biometrics, Passwords, T1 BB 1 34
Challenge Response protocols
35 Authentication applications T1 400 PPT 1 35
36 Kerberos, X.509 T1 401- 427 BB 1 36
Outcome of Unit IV:
CO 4: Apply the various Authentication schemes to simulate different applications.

UNIT V SECURITY PRACTICE AND SYSTEM SECURITY


37 Electronic Mail security T1 436-437 BB 1 37
38 PGP T1 438-456 BB 1 38
39 S/MIME T1 457-473 BB 1 39
40 IP security T1 483-517 BB 1 40
41 Web Security T1 527-561 PPT 1 41
SYSTEM SECURITY: BB 1
42 T1 563-592 42
Intruders
43 Malicious software T1 598-620 BB 1 43
44 Viruses T1 599-613 PPT 1 44
45 Firewalls T1 621-645 PPT 1 45
Outcome of Unit V:
CO 5:Understand various Security practices and System security standards
Course Outcome:

At the end of course:


Students should be able to do:
CO1: Understand the fundamentals of networks security, security architecture, threats and
vulnerabilities
CO 2:Apply the different cryptographic operations of symmetric cryptographic algorithms
CO 3:Apply the different cryptographic operations of public key cryptography
CO 4:Apply the various Authentication schemes to simulate different applications.
CO 5:Understand various Security practices and System security standards
Course Outcome Vs Program Outcome Mapping:

CO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO 1 * * - - - - - - - - - -
CO 2 - * * - - * * * - - - -
4
DSEC/CSE/CS8792/ CRYPTOGRAPHY AND NETWORK SECURITY /IV/VII

CO 3 - * * - - * * * - - - -
CO 4 - * * - - * * * - - - -
CO 5 * * * - - * * * - - - -
Content Beyond Syllabus:

 Security and Privacy in Mobile and Wireless Networking


Assignment: 1
Batch Register Number Total Mode of Topics
Details Number Assignment
814319104001,
814319104002,
1.Security attacks
814319104004 -
Batch 1 17 Written 2. OSI security architecture
814319104009, 3. Simplified DES
814319104011 -
814319104019
1. Perform Encryption and decryption using hill
cipher for the following. Message: PEN and Key:
814319104020 - ACTIVATED.
814319104027, 2. Formulate ceaser cipher for the cipher Text:
814319104029 - PHHW PH DIWHU WKH WRJD SDUWB to
814319104031, identify the plain text with the default key K=3
Batch 2 17 Seminar
814319104033, and also give atleast three important
814319104034, characteristics of this problem that is enabled to
814319104036 - bruteforce cryptanalysis.
814319104039 3. Apply two stage transpositions Cipher on the
“treat diagrams as single units” using the
keyword “sequence”.
814319104040 -
814319104050,
1. OSI security architecture
814319104053,
Batch 3 16 PPT 2. Single round of DES algorithm
814319104055,
3. Steganography
814319104058 -
814319104060
Assignment: 2

Batch Total Mode of


Register Number Topics
Details Number Assignment
814319104001,
814319104002, 1.AES algorithm with round functions.
814319104004 - 2. Perform encryption and decryption using
Batch 1 17 Seminar
814319104009, RSA algorithm for p=17,q=11,e=7 and M=88.
814319104011 - 3.Chinese Remainder Theorem
814319104019

5
DSEC/CSE/CS8792/ CRYPTOGRAPHY AND NETWORK SECURITY /IV/VII

814319104020 -
814319104027,
814319104029 - 1.RSA Algorithm
2.Diffie-Hellman key exchange algorithm with
814319104031,
Batch 2 17 PPT its pros and cons
814319104033,
3.RC5 method used for encryption and
814319104034, decryption.
814319104036 -
814319104039
814319104040 -
814319104050, 1.Modes of operation in block cipher
814319104053, 2.Elliptic curve cryptography with an
Batch 3 16 Written
814319104055, example.
814319104058 - 3.Euclid‟s Algorithm
814319104060
Assignment: 3

Batch Register Total Mode of


Topics
Details Number Number Assignment
814319104001,
814319104002,
814319104004 - 1.Digital Signature Algorithm
Batch 1 17 PPT
814319104009, 2.Hash Functions Algorithm is Designed
814319104011 - 3. Electronic Mail security
814319104019
814319104020 -
814319104027,
814319104029 - 1. Single Round Function In SHA-512
814319104031, Algorithm.
Batch 2 17 Written 2.HMAC Algorithm in Detail
814319104033,
814319104034, 3. PGP
814319104036 -
814319104039
814319104040 -
814319104050,
1.Kerberos
814319104053,
Batch 3 16 Seminar 2.MAC
814319104055, 3. S/MIME
814319104058 -
814319104060

SIM Questions:
SIM 1 Questions of Anna University with Year mentioned (12Q+12Q+ 12Q)
SIM 2 Annexure – I attached
SIM 3

6
DSEC/CSE/CS8792/ CRYPTOGRAPHY AND NETWORK SECURITY /IV/VII

Submission Details:

Phase 1(Before AT 1) Phase 2 (Before AT 2) Phase 3 (Before AT 3)


Assignment 1 SIM 1 Assignment 2 SIM 2 Assignment 3 SIM 3
24-08 -2022 12-09-2022 30-09-2022 19-10-2022 03-11-2022 16-11-2022

Google Class Code Details: 7mxsvry

Prepared By Verified By

(V.GOKULAKRISHNAN /AP/CSE) (Mrs S.R.SOWMYA, HOD/CSE)

Approved By

Principal

7
DSEC/CSE/CS8792/ CRYPTOGRAPHY AND NETWORK SECURITY /IV/VII

ANNEXURE – I

SIM - 1 QUESTIONS

1. Describe various security mechanisms.(DEC2016)


2. Explain OSI security architecture model with neat diagram (DEC2016)
3. Explain classical encryption techniques with symmetric cipher & hill cipher model
4. Write about any two classical crypto system (substitution and transposition) with suitable
examples (NOV2011,NOV 2010, MAY 2009,APR 2012,NOV 2012,,NOV 2007,NOVN 2008)
5. Encrypt the following using play fair cipher using the keyword
MONOARCHY”SWARAJ IS MY BIRTH RIGHT ”. use X for blank space (NOV 2017)
6. What are the different types of attacks? Explain. (Dec - 2013)
7. Discuss any four substitution cipher encryption methods and list their merits and
demerits.(May/June 2008) (May/June 2014)(April/May 2016)
8. What is steganography? Describe the various techniques used in steganography. (April/May
2019)
9. Discuss the properties that are to be satisfied by groups, rings & fields.(NOV 2017)
10. Solve gcd(98,56) using Extended Euclidean Algorithm. Write the algorithm also. (Nov/Dec
2018)
11. Explain in detail about DES and Triple DES(APR 2012,NOV 2009,,APR 2017)
12. Explain about AES in details (NOV 2009,MAY 2009,NOV 2008,NOV 2009,APR 2017)

SIM - 2 QUESTIONS

1. Explain the key generation .encryption & decryption of SDES algorithm in detail.
2. For each of the following elements of DES, indicate the comparable element in AES if
available. (Nov/Dec 2017)
(i) XOR of subkey material with the input to the function.
(ii) F function.
(iii)Permutation p.
(iv) Swapping of halves of the block.
3. Explain about RC4 algorithm.(APR 2012)
4. Write about fermat and euler‟s theorem in detail. (MAY/JUNE 2013,NOV
2012,DEC2016,APR2017), (APR2011,NOV 2012)
5. State chinese remainder theorem & find X for given set of congruent equations X=1(mod
5) x=3(mod 9) x=2(mod 7) x=4(mod 11)
6. Explain the RSA algorithm & explain the RSA with p=7,q=11,e=17,m=8.also discuss its
merits(APR 2011,NOV 2011,NOV 2007,DEC 2016,NOV 2017,APR 2018)
7. Perform encryption and decryption using RSA algorithm for
p = 17, q = 11, e = 7 and M = 88 (A) (Nov/Dec 2018)
8. Discuss the discrete logarithm and explain diffie helman key exchange algorithm. With
its merits and demerits (APR 2011,NOV 2012,NOV 2010,DEC 2016,APR 2017)
9. Explain in details about elliptic curve cryptography(APR 2018)

8
DSEC/CSE/CS8792/ CRYPTOGRAPHY AND NETWORK SECURITY /IV/VII

10. User alice & bob exchange the key using Diffie Helman algorithm. Assume
x=5,q=83,Xa=6,Xb=10.find Ya,Yb,K(NOV 2017)
11. User A & B use the Diffie-Hellman key exchange algorithm with a common prime q=71,and
a primitive root a=7. If user A has a private key Xa =5. What is A‟s public key Ya (June – 2014)
12. Find the secret key shared between user A and user B using Diffie Hellman algorithm for the
following: (Nov/Dec 2018) q = 353; α (primitive root) = 3, XA = 45 and XB = 50

SIM - 3 QUESTIONS
1. Explain about MD5 in detail(APR 2011,APR 2012,DEC 2016,APR 2018)
2. Illustrate about the SHA algorithm and explain (NOV 2017,NOV 2011,NOV 2010,NOV
2009,MAY 2009,MAY 2007)
3. Write a detailed note on digital signatures (NOV 2011,NOV 2010,DEC 2016,APR 2017)
4. Compare the performance of RIPEMD-160 algorithm and SHA-1 algorithm (APR 2017)
5. Describe about hash function. How its algorithm is designed ? Explain in features and
properties(NOV 2012,NOV 2008,APR 2018)
6. Explain the SHA in detail(with neat diagram) for SHA-512 processing of a single 1024
bit block. (May/June 2009)
7. Describe digital signature algorithm and show how signing and verification is done using
DSS. (May/June 2008) (April/May 2019)
8. Explain the operation description of PGP (APR 2011,NOV 2012,NOV 2010,NOV
2009,MAY 2009,DEC 2016,APR 2018)
9. Explain in detail about architecture of IP security (APR 2011,APR 2012,NOV
2010,DEC 2017)
10. Discuss authentication ,header , ESP in detail with their packet format(APR 2017, NOV
2017)
11. Discuss the working of SET & PKT with neat diagram (APR 2011,NOV 2011,APR
2012,NOV 2012, NOV 2010,DEC 2016,APR 2018)
12. Explain the step , methodology involved in SSL/TLS protocol(NOV 2017)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy