DOC/LP/00/21.01.05

/ LESSON PLAN / LP – EC2035
LP Rev. No: 00
Date: 06/07/11
Page 01 of 06
Sub Code & Name: EC2035 CRYPTOGRAPHY AND NETWORK SECURITY
Unit : I Branch : EC Semester: VII

UNIT I INTRODUCTION 10

Syllabus:

OSI Security Architecture - Classical Encryption techniques – Cipher Principles – Data Encryption Standard – Block Cipher Design Principles and Modes of Operation - Evaluation criteria for AES – AES Cipher – Triple DES – Placement of Encryption Function – Traffic Confidentiality.

Objective: To introduce the concept of Symmetric Encryption including classical and modern algorithm.

Session No. / Topics to be covered / Time / Ref / Teaching Method
1.  / Introduction to Cryptography and Network Security / 50m / 1, 2 / BB
2.  / OSI Security Architecture – Security attack, Security mechanism and Security services / 50m / 1, 2 / BB
3.  / Classical Encryption techniques – Symmetric cipher model, Substitution and Transposition techniques, Stegnography. / 50m / 1, 2 / BB
4.  / Cipher principles – Stream cipher and Block cipher, Fiestel Cipher, Confusion and Diffusion / 50m / 1, 6 / BB
5.  / Data Encryption Standard (DES) – DES Encryption and Decryption / 50m / 2, 4 / BB
6.  / Block Cipher Design Principles and Modes of Operation / 50m / 2, 6 / BB
7.  / Evaluation criteria for AES – Origin and Evaluation / 50m / 1, 2, 4 / BB
8.  / AES Cipher – Substitute Bytes transformation, ShiftRows transformation, MixColumns transformation / 50m / 1, 2, 4 / BB
9.  / AES Cipher – AddRoundKey transformation, AES Key Expansion, Equivalent Inverse Cipher and Implementation Aspects. / 50m / 1, 2, 4 / BB
10.  / Triple DES – with two keys and three keys / 50m / 2, 4 / BB
11.  / Placement of Encryption Function and Traffic Confidentiality – Link and End-to-End Encryption / 50m / 2, 4 / BB
CAT – I / - / - / -

DOC/LP/00/21.01.05

/ LESSON PLAN / LP – EC2035
LP Rev. No: 00
Date: 06/07/11
Page 02 of 06
Sub Code & Name: EC2035 CRYPTOGRAPHY AND NETWORK SECURITY
Unit : II Branch : EC Semester: VII

UNIT II PUBLIC KEY CRYPTOGRAPHY 10

Syllabus:

Key Management - Diffie-Hellman key Exchange – Elliptic Curve Architecture and Cryptography - Introduction to Number Theory – Confidentiality using Symmetric Encryption – Public Key Cryptography and RSA.

Objective: To distinguish between symmetric key and asymmetric key crypto system and to discuss the public-key algorithm including RSA and Elliptic curve.

Session No. / Topics to be covered / Time / Ref / Teaching Method
12.  / Key Management – Distribution of Public key and Secret keys / 50m / 1, 3 / BB
13.  / Diffie-Hellman key Exchange – Algorithm, Key Exchange Protocols and Man-in-the-Middle protocol / 50m / 1, 3 / BB
14.  / Elliptic Curve Architecture / 50m / 1, 2, 5 / BB
15.  / Elliptic Curve Cryptography – Encryption and Decryption / 50m / 1, 2, 5 / BB
16.  / Introduction to Number Theory – Fermat’s and Euler’s theorem and Discrete Logarithms / 50m / 1, 2 / BB
17.  / Problems on Number Theory / 50m / 1, 2 / BB
18.  / Confidentiality using Symmetric Encryption – Key Distribution , Random Number Generation / 50m / 1, 8 / BB
19.  / Public Key Cryptography - Principles / 50m / 1, 8 / BB
20.  / RSA – Description of the algorithm, Computational aspect. / 50m / 1, 2, 8 / BB
21.  / RSA - Security / 50m / 1, 2, 8 / BB
CAT – II / - / - / -

DOC/LP/00/21.01.05

/ LESSON PLAN / LP – EC2035
LP Rev. No: 00
Date: 06/07/11
Page 03 of 06
Sub Code & Name: EC2035 CRYPTOGRAPHY AND NETWORK SECURITY
Unit : III Branch : EC Semester: VII

UNIT III AUTHENTICATION AND HASH FUNCTION 9

Syllabus:

Authentication requirements – Authentication functions – Message Authentication Codes – Hash Functions – Security of Hash Functions and MACs – MD5 message Digest 51 algorithm – Secure Hash Algorithm – RIPEMD – HMAC Digital Signatures – Authentication Protocols – Digital Signature Standard.

Objective: To define Message Authentication and to discuss MAC and Hash function.

Session No. / Topics to be covered / Time / Ref / Teaching Method
22.  / Authentication requirements and Functions / 50m / 1, 4 / BB
23.  / Message Authentication Codes – Requirements / 50m / 1, 4 / BB
24.  / Hash Functions – Requirements, Birthday attack and Block chaining techniques / 50m / 1, 4 / BB
25.  / Security of Hash Functions and MACs – Brute-Force attacks and Cryptanalysis / 50m / 1, 2, 4 / BB
26.  / Message Digest 5 algorithm / 50m / 3 / BB
27.  / Message Digest 5 algorithm / 50m / 3 / BB
28.  / Secure Hash Algorithm – SHA-512 Logic and Round Function / 50m / 1, 3 / BB
29.  / RIPEMD, HMAC – Algorithm and Security / 50m / 1, 3 / BB
30.  / Digital Signatures – Requirements, Direct and Arbitrated Digital signature / 50m / 1, 2, 3 / BB
31.  / Authentication Protocol – Mutual and One-way authentication / 50m / 1, 3, 8 / BB
32.  / Digital Signature Standard – Approach and Algorithm.
CAT – III / - / - / -

DOC/LP/00/21.01.05

/ LESSON PLAN / LP – EC2035
LP Rev. No: 00
Date: 06/07/11
Page 04 of 06
Sub Code & Name: EC2035 CRYPTOGRAPHY AND NETWORK SECURITY
Unit : IV Branch : EC Semester: VII

UNIT IV NETWORK SECURITY 8

Syllabus:

Authentication Applications: Kerberos – X.509 Authentication Service – Electronic Mail Security – PGP – S/MIME – IP Security – Web Security.

Session No. / Topics to be covered / Time / Ref / Teaching Method
33.  / Authentication application – Kerberos – Version 4 and 5 / 50m / 1, 2, 5 / BB
34.  / X.509 Authentication Service – Certificates, Authentication Procedures and X.509 Version 3 / 50m / 1, 2, 5 / BB
35.  / Electronic Mail Security: PGP – Notation, Operational Description, Cryptographic Keys and Key Rings, Public Key Management / 50m / 1, 2 / BB
36.  / S/MIME – RFC 822, Multipurpose Internet Mail Extensions, Functionality, Messages and Certificate Processing / 50m / 1, 2 / BB
37.  / IP Security - Overview and Architecture / 50m / 1, 2, 8 / BB
38.  / IP Security – Authentication Header / 50m / 1, 2, 8 / BB
39.  / IP Security – Encapsulating Security Payload and Combining Security Association / 50m / 1, 2, 8 / BB
40.  / Web Security – Secure Socket Layer (SSL) and Transport Layer Security / 50m / 1, 2, 5 / BB
41.  / Web Security – Secure Electronic Transaction (SET) / 50m / 1, 2 / BB
CAT – IV / - / - / -

Objective: To examine the use of cryptographic algorithm and security protocol to provide security over network and the Internet.

DOC/LP/00/21.01.05

/ LESSON PLAN / LP – EC2035
LP Rev. No: 00
Date: 06/07/11
Page 05 of 06

Sub Code & Name: EC2035 CRYPTOGRAPHY AND NETWORK SECURITY

Unit : V Branch : EC Semester: VII

UNIT V SYSTEM LEVEL SECURITY 8

Syllabus:

Intrusion detection – password management – Viruses and related Threats – Virus Counter measures – Firewall Design Principles – Trusted Systems.

Objective: To deals with security facilities designed to protect a computer system from security threats, including intruders, viruses and worms.

Session No. / Topics to be covered / Time / Ref / Teaching Method
42.  / Intrusion Detection – Different Approaches / 50m / 1, 7 / BB
43.  / Intrusion Detection – Different Approaches / 50m / 1, 7 / BB
44.  / Password Management – Password Protection and Password Selection Strategies / 50m / 1, 4 / BB
45.  / Viruses and Related Threats – Nature and Types of Viruses and Worms / 50m / 1, 4 / BB
46.  / Worms and State of Worm technology / 50m / 1, 4 / BB
47.  / Virus Countermeasures – Antivirus approaches / 50m / 1, 4, 7 / BB
48.  / Virus Countermeasures – Antivirus Techniques / 50m / 1, 4, 7 / BB
49.  / Firewall Design Principles – Characteristics, Types and Configuration / 50m / 1, 8 / BB
50.  / Trusted Systems – Data Access Control, Concept and Trojan Horse Defense / 50m / 1, 4 / BB
CAT – V / - / - / -

DOC/LP/00/21.01.05

/ LESSON PLAN / LP – EC2035
LP Rev. No: 00

Date: 06/07/11

Page 06 of 06

Sub Code & Name: EC2035 CRYPTOGRAPHY AND NETWORK SECURITY

Branch : EC Semester: VII

Course Delivery Plan:

Week / 1 / 2 / 3 / 4 / 5 / 6 / 7 / 8 / 9 / 10 / 11 / 12 / 13
I II / I II / I II / I II / I II / I II / I II / I II / I II / I II / I II / I II / I
Units / / / / / /

CAT I CAT II CAT III CAT IV CAT V

TEXT BOOK

  1. William Stallings, “Cryptography and Network Security – Principles and Practices”,

Pearson Education, Third Edition, 2003.

  1. Behrouz A. Foruzan, “Cryptography and Network Security”, Tata McGraw-Hill, 2007.

REFERENCES

  1. Bruce Schneier, “Applied Cryptography”, John Wiley & Sons Inc, 2001.
  2. Charles B. Pfleeger, Shari Lawrence Pfleeger, “Security in Computing”, Third Edition, Pearson Education, 2003.
  3. Wade Trappe and Lawrence C. Washington, “Introduction to Cryptography with

coding theory”, Pearson Education, 2007.

  1. Wenbo Mao, “Modern Cryptography Theory and Practice”, Pearson Education,

2007.

  1. Thomas Calabrese, “Information Security Intelligence : Cryptographic Principles and

Applications”, Thomson Delmar Learning, 2006.

  1. Atul Kahate, “Cryptography and Network Security”, Tata McGraw-Hill, 2003.

Prepared by / Approved by

Signature

Name / M.Athappan / R.Kousalya / Prof.E.G.Govindan
Designation / Assistant Professor / HoD, Department of ECE
Date / 06/07/2011 / 06/07/2011