Académique Documents
Professionnel Documents
Culture Documents
SRI RAMAKRISHNA ENGINEERING COLLEGE, COIMBATORE-22 DEPARTMENT: INFORMATION TECHNOLOGY SUBJECT CODE & TITLE: CLASS: Aim:
To understand the principles of encryption algorithms, conventional and public key cryptography. To have a detailed knowledge about authentication, hash functions and application level security mechanisms.
Course Objective
To know the methods of conventional encryption. To understand the concepts of public key encryption and number theory To understand authentication and Hash functions. To know the network security tools and applications. To understand the system level security used.
Name of the Faculty: KARPAGAM.V AP/IT LESSON PLAN Lecture Hours Portions to be Covered Text Book/ Reference Book
T1, R1 T1, R1 T1, R1 T1, R1 T1, R1 T1, R1 T1, R1 T1, R1 T1, R1
Interactive Session
Problem Solving
UNIT II PUBLIC KEY CRYPTOGRAPHY Key Management 10. 11. 12. 13. 14. 15. 16 17.
Diffie Hellmann Key Exchange Elliptic Curve Architecture Elliptic Curve Cryptography Introduction to Number Theory Confidentiality using Symmetric Encryption Public Key Cryptography RSA
T1 T1 T1 T1 T1 T1 T1 T1
Interactive Session
QP08/11-12/AF/LEP/05
18.
Tutorial
T1
UNIT III AUTHENTICATION AND HASH FUNCTION T1 Authentication Requirements 19. T1 Authentication functions 20. T1 Message Authentication Codes 21. 22. 23. 24. 25. 26. 27.
Security of Hash Functions MD5 message digest algorithm Secure Hash Algorithm RIPEMD HMAC Digital Signatures Authentication Protocols Digital Signature Standard
T1 T1 T1 T1 T1 T1
OHP
Black Board
Interactive Session
UNIT IV NETWORK SECURITY Authentication Applications 28. Kerberos 29. 30. 31. 32. 33. 34. 35. 36.
X.509 Authentication Service Electronic Mail Security PGP S/MIME IP Security Web Security- SSL Secure Electronic Transaction - SET
Quiz Interactive Session Interactive Session Short Seminar Interactive Session Problem Solving
UNIT V SYSTEM LEVEL SECURITY Intrusion Detection 37. 38. 39. 40. 41. 42. 43. 44. 45.
Password Management Viruses and Related Threats Virus Countermeasures Types of Firewalls Firewall Configurations Trusted Systems Tutorial Revision
OHP
Black Board
Interactive Session Programming Quiz Short Seminar Interactive Session Interactive Session
Total No. of hours required to complete the syllabus: 45 Content Beyond the syllabus Lecture Hours 1. 2. 3. Text Book/ Reference Book
T1 R1 T1 PPT Teaching Methodology planned Activity Planned for Learners
Portions to be Covered
Whirlpool, CMAC algorithms Challenge Response Tokens Distributed Denial of Service
Interactive Session
Total No. of hours required to complete the content beyond the syllabus: 3
QP08/11-12/AF/LEP/05
Text books:
1. William Stallings, Cryptography And Network Security Principles and Practices, Prentice Hall of India, Third Edition, 2006.(UNIT 1-5)
Reference Books:
1. Atul Kahate, Cryptography and Network Security, Tata McGraw-Hill, 2007. 2. Bruce Schneier, Applied Cryptography, John Wiley & Sons Inc, 2006. 3. Charles B. Pfleeger, Shari Lawrence Pfleeger, Security in Computing, Third Edition, Pearson Education, 2004.
Staff In-charge
HOD