Vous êtes sur la page 1sur 3

QP08/11-12/AF/LEP/05

SRI RAMAKRISHNA ENGINEERING COLLEGE, COIMBATORE-22 DEPARTMENT: INFORMATION TECHNOLOGY SUBJECT CODE & TITLE: CLASS: Aim:
To understand the principles of encryption algorithms, conventional and public key cryptography. To have a detailed knowledge about authentication, hash functions and application level security mechanisms.

08AF606 NETWORK SECURITY SEMESTER: 6

III B.TECH IT- COMMON TO B SECTION

Course Objective
To know the methods of conventional encryption. To understand the concepts of public key encryption and number theory To understand authentication and Hash functions. To know the network security tools and applications. To understand the system level security used.

Name of the Faculty: KARPAGAM.V AP/IT LESSON PLAN Lecture Hours Portions to be Covered Text Book/ Reference Book
T1, R1 T1, R1 T1, R1 T1, R1 T1, R1 T1, R1 T1, R1 T1, R1 T1, R1

Teaching Methodology planned

Activity Planned for Learners

UNIT I INTRODUCTION OSI Security Architecture 1. 2. 3. 4. 5. 6. 7. 8. 9.


Classical Encryption Techniques Cipher Principles Data Encryption Standard Block Cipher Design Principles, Modes of Operation Evaluation Criteria for AES AES Cipher Triple DES, Placement of Encryption Function Traffic Confidentiality

Black Board OHP

Group Quiz Interactive Session Quiz

OHP Black Board

Interactive Session

Problem Solving

UNIT II PUBLIC KEY CRYPTOGRAPHY Key Management 10. 11. 12. 13. 14. 15. 16 17.
Diffie Hellmann Key Exchange Elliptic Curve Architecture Elliptic Curve Cryptography Introduction to Number Theory Confidentiality using Symmetric Encryption Public Key Cryptography RSA

T1 T1 T1 T1 T1 T1 T1 T1

Black Board OHP Black Board OHP

Interactive Session

Quiz Interactive Session

QP08/11-12/AF/LEP/05

18.

Tutorial

T1

UNIT III AUTHENTICATION AND HASH FUNCTION T1 Authentication Requirements 19. T1 Authentication functions 20. T1 Message Authentication Codes 21. 22. 23. 24. 25. 26. 27.
Security of Hash Functions MD5 message digest algorithm Secure Hash Algorithm RIPEMD HMAC Digital Signatures Authentication Protocols Digital Signature Standard
T1 T1 T1 T1 T1 T1

OHP

Quiz Interactive Session

Black Board

Interactive Session

UNIT IV NETWORK SECURITY Authentication Applications 28. Kerberos 29. 30. 31. 32. 33. 34. 35. 36.
X.509 Authentication Service Electronic Mail Security PGP S/MIME IP Security Web Security- SSL Secure Electronic Transaction - SET

T1,R1 T1,R1 T1,R1 T1,R1 T1,R1 T1,R1 T1,R1 T1,R1 T1,R1

Black Board OHP Black Board

Quiz Interactive Session Interactive Session Short Seminar Interactive Session Problem Solving

UNIT V SYSTEM LEVEL SECURITY Intrusion Detection 37. 38. 39. 40. 41. 42. 43. 44. 45.
Password Management Viruses and Related Threats Virus Countermeasures Types of Firewalls Firewall Configurations Trusted Systems Tutorial Revision

T1,R1,R2 T1,R1,R2 T1,R1,R2 T1,R1,R2 T1,R1,R2 T1,R1,R2 T1,R1,R2 T1,R1,R2 -

OHP

Black Board

Interactive Session Programming Quiz Short Seminar Interactive Session Interactive Session

OHP Black Board

Total No. of hours required to complete the syllabus: 45 Content Beyond the syllabus Lecture Hours 1. 2. 3. Text Book/ Reference Book
T1 R1 T1 PPT Teaching Methodology planned Activity Planned for Learners

Portions to be Covered
Whirlpool, CMAC algorithms Challenge Response Tokens Distributed Denial of Service

Interactive Session

Total No. of hours required to complete the content beyond the syllabus: 3

QP08/11-12/AF/LEP/05

Text books:
1. William Stallings, Cryptography And Network Security Principles and Practices, Prentice Hall of India, Third Edition, 2006.(UNIT 1-5)

Reference Books:
1. Atul Kahate, Cryptography and Network Security, Tata McGraw-Hill, 2007. 2. Bruce Schneier, Applied Cryptography, John Wiley & Sons Inc, 2006. 3. Charles B. Pfleeger, Shari Lawrence Pfleeger, Security in Computing, Third Edition, Pearson Education, 2004.

Staff In-charge

HOD

Vous aimerez peut-être aussi