CNS Course File-2021
CNS Course File-2021
Prepared by
E.SAMATHA SREE CHATURVEDI
B.Tech, MBA (HR), M.Tech (CSE), (PhD-ML)
Assistant Professor
Department of CSE
Vision of the Institute
To emerge as a premier institute for high quality professional graduates who can contribute to
economic and social developments of the Nation.
Mission of the Institute
Mission Statement
Laying the path for rich skills in Computer Science through the basic
DM1
knowledge of mathematics and fundamentals of engineering
1
Program Educational Objectives (PEOs)
PEO’s Statement
The graduates of the program will have solid technical and professional
PEO2
foundation to continue higher studies.
The graduate of the program will have skills to develop products, offer
PEO3
services and innovation.
Program Outcomes
Modern tool usage: Create, select, and apply appropriate techniques, resources,
PO5 and modern engineering and IT tools including prediction and modelling to
2
complex engineering activities with an understanding of the limitations.
3
SYLLABUS
UNIT - I
Security Concepts: Introduction, The need for security, Security approaches, Principles of security,
Types of Security attacks, Security services, Security Mechanisms, A model for Network Security
Cryptography Concepts and Techniques: Introduction, plain text and cipher text, substitution
techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key
cryptography, steganography, key range and key size, possible types of attacks.
UNIT - II
Symmetric key Ciphers: Block Cipher principles, DES, AES, Blowfish, RC5, IDEA, Block cipher
operation, Stream ciphers, RC4.
Asymmetric key Ciphers: Principles of public key cryptosystems, RSA algorithm, Elgamal
Cryptography, Diffie-Hellman Key Exchange, Knapsack Algorithm.
UNIT - III
Key Management and Distribution: Symmetric Key Distribution Using Symmetric & Asymmetric
Encryption, Distribution of Public Keys, Kerberos, X.509 Authentication Service, Public – Key
Infrastructure
UNIT - IV
Transport-level Security: Web security considerations, Secure Socket Layer and Transport Layer
Security, HTTPS, Secure Shell (SSH)
Wireless Network Security: Wireless Security, Mobile Device Security, IEEE 802.11 Wireless
LAN, IEEE 802.11i Wireless LAN Security
UNIT - V
E-Mail Security: Pretty Good Privacy, S/MIME IP Security: IP Security overview, IP Security
architecture, Authentication Header, Encapsulating security payload, Combining security
associations, Internet Key Exchange
Case Studies on Cryptography and security: Secure Multiparty Calculation, Virtual Elections,
Single sign On, Secure Inter-branch Payment Transactions, Cross site Scripting Vulnerability.
TEXT BOOK
1. Cryptography and Network Security - Principles and Practice: William Stallings, Pearson
Education, 6th Edition
2. Cryptography and Network Security: Atul Kahate, Mc Graw Hill, 3rd Edition
4
REFERENCES
2. Cryptography and Network Security: Forouzan Mukhopadhyay, Mc Graw Hill, 3rd Edition
COURSE OBJECTIVES
Explain the importance and application of each of confidentiality, integrity, authentication and
availability
Generate and distribute a PGP key pair and use the PGP package to send an encrypted email
message.
COURSE OUTCOMES
5
C411.4: Choose the intrusion detection and its solutions to overcome the attacks. [Evaluate]
Justification
PO1 Students will be able to know the concept of Mathematics.
PO2 Students will be able to solve complex problems and interpret the data.
PO10 Students will be able to communicate with the people effectively.
PO12 Students will be able to know how to learn about the evolving technologies.
Justification
PO1 Students will able to identify different problems and they can analyze.
PO2 Students will able to analyze the complexity of the problems.
PO10 Students will be able to explain the encryption and decryption techniques easily.
6
PO11 Students will be able to learn the principles of cryptographic techniques.
Justification
PO1 Students will be able to apply the knowledge of basic mathematics while using
algorithms.
PO2 Students will be able to design the solutions for different authentication mechanisms.
PO6 Students will be able to evaluate the algorithms based on the contextual knowledge.
C411.4: Choose the intrusion detection and its solutions to overcome the attacks.[Evaluate]
Justification
PO1 Students will be able to apply the mathematical knowledge on the different attacks.
PO2 Students will be able to develop the solutions for different types of attacks the system
will undergo.
PO3 Students will be able to design the solutions to overcome the attacks.
PO4 Students will be able to conduct interpretation of data and provide proper
conclusions.
PO5 Students will be able to learn the modern tools which are used to overcome the
attacks.
PO9 Students will be able to communicate as an individual if any attack occurs.
PO10 Students will be able to make effective presentations on the recent attack.
PO11 Students will be able to apply all these mechanisms in different environments.
Justification
PO1 Students will be able to generate passwords by applying the knowledge of
mathematics.
PO2 Students will be able to design and develop the strong passwords to overcome the
attacks.
PO3 Students will be able design solutions for complex problems.
PO4 Students will be able to analyze and interpret the data based on the problem.
PO5 Students will be able to learn the new tools which are used for developing passwords.
PO9 Students will be able to do any work effectively in any environment.
PO10 Students will be able to write effective reports and make effective presentations.
PO11 Students will be able to demonstrate their work in any environment.
PO12 Students will be able to recognize the need for developing the methods to create
passwords.
7
Lesson Plan – (CS701PC) CRYPTOGRAPHY AND NETWORK SECURITY
w.e.f: 06-09-2021
7 Introduction, Plain text and Cipher Text, Substitution 17-09-2021 17-09-2021 Chalk & Talk
Techniques,
18-09-2021 18-09-2021
8 Transposition Techniques Chalk & Talk
22-09-2021 22-09-2021
10 Encryption & Decryption 23-09-2021 23-09-2021 Chalk & Talk
24-09-2021
11 Symmetric and Assymetric Cryptography 25-09-2021 Chalk & Talk
25-09-2021
13 Steganography, Key range and Key Size 29-09-2021 30-09-2021 Chalk & Talk
8
16 DES,AES 07-10-2021 07-10-2021 Chalk & Talk
21 Principles of Public Key Crypto Systems 23-10-2021 23-10-2021 Chalk & Talk
23 Diffie Hellman Key Exchnage, Knapsack Algorithm 28-10-2021 28-10-2021 Chalk & Talk
UNIT – 3
24 29-10-2021 29-10-2021 Chalk & Talk
Message Authentication , Secure Hash Algorithm
(SHA -512)
25 Authentication Requirements, HMAC 30-10-2021 30-10-2021 Chalk & Talk
29 Symmetric Key Distribution Using Symmetric and 06-11-2021 06-11-2021 Chalk & Talk
Asymmetric Encryption
30 Symmetric Key Distribution Using Symmetric and 17-11-2021 17-11-2021 Chalk & Talk
Asymmetric Encryption
31 18-11-2021 18-11-2021 Chalk & Talk
Distribution of Public Key
9
33 20-11-2021 20-11-2021 Chalk & Talk
X.509 Authentication Service
24-11-2021
34 Public Key Infrastructure 25-11-2021 Chalk & Talk
25-11-2021
39 Wireless Security , Mobile Device Security 02-12-2021 02-12-2021 Chalk & Talk
UNIT – 5
10
49 22-12-2021 22-12-2021 Chalk & Talk
Internet Key Exchange
Web resources:
1. https://nptel.ac.in/courses/106/105/106105031/
2. https://en.wikipedia.org/wiki/Cryptography
TIME TABLE
11
UNIVERSITY CALENDAR
ASSIGNMENT-1
4. Use RSA algorithm, Perform encryption and decryption with p=3,q=11,e=7 and N=5.
7. Draw a neat sketch to explain the concept of Secured Hash Algorithm (SHA)
12
ASSIGNMENT-2
4. What is meant by transport mode and tunnel mode? How is authentication header
5. Explain IP security architecture and also explain basic combinations of security associations
13