DOC/LP/00/21.01.05
/ LESSON PLAN / LP – EC2035LP Rev. No: 00
Date: 06/07/11
Page 01 of 06
Sub Code & Name: EC2035 CRYPTOGRAPHY AND NETWORK SECURITY
Unit : I Branch : EC Semester: VIIUNIT I INTRODUCTION 10
Syllabus:
OSI Security Architecture - Classical Encryption techniques – Cipher Principles – Data Encryption Standard – Block Cipher Design Principles and Modes of Operation - Evaluation criteria for AES – AES Cipher – Triple DES – Placement of Encryption Function – Traffic Confidentiality.
Objective: To introduce the concept of Symmetric Encryption including classical and modern algorithm.
Session No. / Topics to be covered / Time / Ref / Teaching Method1. / Introduction to Cryptography and Network Security / 50m / 1, 2 / BB
2. / OSI Security Architecture – Security attack, Security mechanism and Security services / 50m / 1, 2 / BB
3. / Classical Encryption techniques – Symmetric cipher model, Substitution and Transposition techniques, Stegnography. / 50m / 1, 2 / BB
4. / Cipher principles – Stream cipher and Block cipher, Fiestel Cipher, Confusion and Diffusion / 50m / 1, 6 / BB
5. / Data Encryption Standard (DES) – DES Encryption and Decryption / 50m / 2, 4 / BB
6. / Block Cipher Design Principles and Modes of Operation / 50m / 2, 6 / BB
7. / Evaluation criteria for AES – Origin and Evaluation / 50m / 1, 2, 4 / BB
8. / AES Cipher – Substitute Bytes transformation, ShiftRows transformation, MixColumns transformation / 50m / 1, 2, 4 / BB
9. / AES Cipher – AddRoundKey transformation, AES Key Expansion, Equivalent Inverse Cipher and Implementation Aspects. / 50m / 1, 2, 4 / BB
10. / Triple DES – with two keys and three keys / 50m / 2, 4 / BB
11. / Placement of Encryption Function and Traffic Confidentiality – Link and End-to-End Encryption / 50m / 2, 4 / BB
CAT – I / - / - / -
DOC/LP/00/21.01.05
/ LESSON PLAN / LP – EC2035LP Rev. No: 00
Date: 06/07/11
Page 02 of 06
Sub Code & Name: EC2035 CRYPTOGRAPHY AND NETWORK SECURITY
Unit : II Branch : EC Semester: VII
UNIT II PUBLIC KEY CRYPTOGRAPHY 10
Syllabus:
Key Management - Diffie-Hellman key Exchange – Elliptic Curve Architecture and Cryptography - Introduction to Number Theory – Confidentiality using Symmetric Encryption – Public Key Cryptography and RSA.
Objective: To distinguish between symmetric key and asymmetric key crypto system and to discuss the public-key algorithm including RSA and Elliptic curve.
Session No. / Topics to be covered / Time / Ref / Teaching Method12. / Key Management – Distribution of Public key and Secret keys / 50m / 1, 3 / BB
13. / Diffie-Hellman key Exchange – Algorithm, Key Exchange Protocols and Man-in-the-Middle protocol / 50m / 1, 3 / BB
14. / Elliptic Curve Architecture / 50m / 1, 2, 5 / BB
15. / Elliptic Curve Cryptography – Encryption and Decryption / 50m / 1, 2, 5 / BB
16. / Introduction to Number Theory – Fermat’s and Euler’s theorem and Discrete Logarithms / 50m / 1, 2 / BB
17. / Problems on Number Theory / 50m / 1, 2 / BB
18. / Confidentiality using Symmetric Encryption – Key Distribution , Random Number Generation / 50m / 1, 8 / BB
19. / Public Key Cryptography - Principles / 50m / 1, 8 / BB
20. / RSA – Description of the algorithm, Computational aspect. / 50m / 1, 2, 8 / BB
21. / RSA - Security / 50m / 1, 2, 8 / BB
CAT – II / - / - / -
DOC/LP/00/21.01.05
/ LESSON PLAN / LP – EC2035LP Rev. No: 00
Date: 06/07/11
Page 03 of 06
Sub Code & Name: EC2035 CRYPTOGRAPHY AND NETWORK SECURITY
Unit : III Branch : EC Semester: VII
UNIT III AUTHENTICATION AND HASH FUNCTION 9
Syllabus:
Authentication requirements – Authentication functions – Message Authentication Codes – Hash Functions – Security of Hash Functions and MACs – MD5 message Digest 51 algorithm – Secure Hash Algorithm – RIPEMD – HMAC Digital Signatures – Authentication Protocols – Digital Signature Standard.
Objective: To define Message Authentication and to discuss MAC and Hash function.
Session No. / Topics to be covered / Time / Ref / Teaching Method22. / Authentication requirements and Functions / 50m / 1, 4 / BB
23. / Message Authentication Codes – Requirements / 50m / 1, 4 / BB
24. / Hash Functions – Requirements, Birthday attack and Block chaining techniques / 50m / 1, 4 / BB
25. / Security of Hash Functions and MACs – Brute-Force attacks and Cryptanalysis / 50m / 1, 2, 4 / BB
26. / Message Digest 5 algorithm / 50m / 3 / BB
27. / Message Digest 5 algorithm / 50m / 3 / BB
28. / Secure Hash Algorithm – SHA-512 Logic and Round Function / 50m / 1, 3 / BB
29. / RIPEMD, HMAC – Algorithm and Security / 50m / 1, 3 / BB
30. / Digital Signatures – Requirements, Direct and Arbitrated Digital signature / 50m / 1, 2, 3 / BB
31. / Authentication Protocol – Mutual and One-way authentication / 50m / 1, 3, 8 / BB
32. / Digital Signature Standard – Approach and Algorithm.
CAT – III / - / - / -
DOC/LP/00/21.01.05
/ LESSON PLAN / LP – EC2035LP Rev. No: 00
Date: 06/07/11
Page 04 of 06
Sub Code & Name: EC2035 CRYPTOGRAPHY AND NETWORK SECURITY
Unit : IV Branch : EC Semester: VII
UNIT IV NETWORK SECURITY 8
Syllabus:
Authentication Applications: Kerberos – X.509 Authentication Service – Electronic Mail Security – PGP – S/MIME – IP Security – Web Security.
Session No. / Topics to be covered / Time / Ref / Teaching Method33. / Authentication application – Kerberos – Version 4 and 5 / 50m / 1, 2, 5 / BB
34. / X.509 Authentication Service – Certificates, Authentication Procedures and X.509 Version 3 / 50m / 1, 2, 5 / BB
35. / Electronic Mail Security: PGP – Notation, Operational Description, Cryptographic Keys and Key Rings, Public Key Management / 50m / 1, 2 / BB
36. / S/MIME – RFC 822, Multipurpose Internet Mail Extensions, Functionality, Messages and Certificate Processing / 50m / 1, 2 / BB
37. / IP Security - Overview and Architecture / 50m / 1, 2, 8 / BB
38. / IP Security – Authentication Header / 50m / 1, 2, 8 / BB
39. / IP Security – Encapsulating Security Payload and Combining Security Association / 50m / 1, 2, 8 / BB
40. / Web Security – Secure Socket Layer (SSL) and Transport Layer Security / 50m / 1, 2, 5 / BB
41. / Web Security – Secure Electronic Transaction (SET) / 50m / 1, 2 / BB
CAT – IV / - / - / -
Objective: To examine the use of cryptographic algorithm and security protocol to provide security over network and the Internet.
DOC/LP/00/21.01.05
/ LESSON PLAN / LP – EC2035LP Rev. No: 00
Date: 06/07/11
Page 05 of 06
Sub Code & Name: EC2035 CRYPTOGRAPHY AND NETWORK SECURITY
Unit : V Branch : EC Semester: VIIUNIT V SYSTEM LEVEL SECURITY 8
Syllabus:
Intrusion detection – password management – Viruses and related Threats – Virus Counter measures – Firewall Design Principles – Trusted Systems.
Objective: To deals with security facilities designed to protect a computer system from security threats, including intruders, viruses and worms.
Session No. / Topics to be covered / Time / Ref / Teaching Method42. / Intrusion Detection – Different Approaches / 50m / 1, 7 / BB
43. / Intrusion Detection – Different Approaches / 50m / 1, 7 / BB
44. / Password Management – Password Protection and Password Selection Strategies / 50m / 1, 4 / BB
45. / Viruses and Related Threats – Nature and Types of Viruses and Worms / 50m / 1, 4 / BB
46. / Worms and State of Worm technology / 50m / 1, 4 / BB
47. / Virus Countermeasures – Antivirus approaches / 50m / 1, 4, 7 / BB
48. / Virus Countermeasures – Antivirus Techniques / 50m / 1, 4, 7 / BB
49. / Firewall Design Principles – Characteristics, Types and Configuration / 50m / 1, 8 / BB
50. / Trusted Systems – Data Access Control, Concept and Trojan Horse Defense / 50m / 1, 4 / BB
CAT – V / - / - / -
DOC/LP/00/21.01.05
/ LESSON PLAN / LP – EC2035LP Rev. No: 00
Date: 06/07/11
Page 06 of 06
Sub Code & Name: EC2035 CRYPTOGRAPHY AND NETWORK SECURITY
Branch : EC Semester: VII
Course Delivery Plan:
Week / 1 / 2 / 3 / 4 / 5 / 6 / 7 / 8 / 9 / 10 / 11 / 12 / 13I II / I II / I II / I II / I II / I II / I II / I II / I II / I II / I II / I II / I
Units / / / / / /
CAT I CAT II CAT III CAT IV CAT V
TEXT BOOK
- William Stallings, “Cryptography and Network Security – Principles and Practices”,
Pearson Education, Third Edition, 2003.
- Behrouz A. Foruzan, “Cryptography and Network Security”, Tata McGraw-Hill, 2007.
REFERENCES
- Bruce Schneier, “Applied Cryptography”, John Wiley & Sons Inc, 2001.
- Charles B. Pfleeger, Shari Lawrence Pfleeger, “Security in Computing”, Third Edition, Pearson Education, 2003.
- Wade Trappe and Lawrence C. Washington, “Introduction to Cryptography with
coding theory”, Pearson Education, 2007.
- Wenbo Mao, “Modern Cryptography Theory and Practice”, Pearson Education,
2007.
- Thomas Calabrese, “Information Security Intelligence : Cryptographic Principles and
Applications”, Thomson Delmar Learning, 2006.
- Atul Kahate, “Cryptography and Network Security”, Tata McGraw-Hill, 2003.
Prepared by / Approved by
Signature
Name / M.Athappan / R.Kousalya / Prof.E.G.GovindanDesignation / Assistant Professor / HoD, Department of ECE
Date / 06/07/2011 / 06/07/2011