Vous êtes sur la page 1sur 11




Murari Kumar Singh

Department of Computer Science & Engineering

IEC Group of Institutions, Greater Noida
July 2018
Contents of Course File
Contents of Course File

1. Objective (with examples) and Outcomes

2. Evalution scheme (As per the AKTU)
3. Syllabus, Text books, Reference books and other source for study material,
such as websites link -NPTEL, etc.
4. Time table (Individual)
5. Lecture plan (It should be detailed atleast at topic and sub topic level)
6. Tutorials with solutions (if applicable). It should include some past year
university questions
7. Assignments with solutions (It should include some past year university
8. Attendance Register
9. Notes, etc.
10. Past year university question papers and sessional papers and their
Course Objectives

Course Objectives:
This course gives the introduction and concepts of Network Security and
Cryptography to secure the network over unreliable environment. The objectives of
this course can be illustrated as:

 To provide conceptual understanding of network security issues.

 To develop basic skills of secure network architecture and explain the theory
behind the security of different cryptographic algorithms.

 To describe common network vulnerabilities and attacks, defense
mechanisms against network attacks, and cryptographic protection

 To explore the requirements of real-time communication security and issues
related to the security of web services.

Course Outcome
The Fundamental of Network Security program gives students the chance to develop the
technical skills necessary to fully manage sophisticated and vulnerable computer network
environments. Students will have the skill sets needed to handle the day-to-day
troubleshooting problems for securing the networks of all sizes. After completion of this
course, students will be able to:

  Manage multiple operating systems, systems software, network services and security.
  Evaluate and compare systems software and emerging technologies.
 Develop solutions for networking and security problems, balancing business
 concerns, technical issues, and security.
 Explain concepts and theories of networking and apply them to various situations,
 classifying networks, analyzing performance, and implementing new technologies.
  Identify Infrastructure components and the roles they serve.
 Design infrastructure including devices, topologies, protocols, systems
 software, management, and security.
 Effectively communicate technical information verbally, in writing, and in
 presentations.
 Use appropriate resources to stay abreast of the latest industry tools and techniques
 analyzing the impact on existing systems and applying to future situations.
 Explain the concepts of Confidentiality, Availability, and Integrity in Information
Assurance, including physical, software, devices, policies, and people. Analyze
these factors in an existing system and design implementations.

 Cite and comply with relevant industry and organizational codes of conduct and


Introduction to security attacks, services and mechanism, Classical encryption techniques-
substitution ciphers and transposition ciphers, cryptanalysis, steganography, Stream and
block ciphers. Modern Block Ciphers: Block ciphers principles, Shannon’s theory of
confusion and diffusion, fiestal structure, Data encryption standard (DES), Strength of DES,
Idea of differential cryptanalysis, block cipher modes of operations, Triple DES

Introduction to group, field, finite field of the form GF(p), modular arithmetic, prime and
relative prime numbers, Extended Euclidean Algorithm, Advanced Encryption Standard
(AES) encryption and decryption Fermat’s and Euler’s theorem, Primarily testing, Chinese
Remainder theorem, Discrete Logarithmic Problem, Principals of public key crypto systems,
RSA algorithm, security of RSA

Message Authentication Codes: Authentication requirements, authentication functions,
message authentication code, hash functions, birthday attacks, security of hash functions,
Secure hash algorithm (SHA) Digital Signatures: Digital Signatures, Elgamal Digital
Signature Techniques, Digital signature standards (DSS), proof of digital signature algorithm

Key Management and distribution: Symmetric key distribution, Diffie-Hellman Key
Exchange, Public key distribution, X.509 Certificates, Public key Infrastructure.
Authentication Applications: Kerberos, Electronic mail security: pretty good privacy (PGP),

IP Security: Architecture, Authentication header, Encapsulating security payloads,
combining security associations, key management. Introduction to Secure Socket Layer,
Secure electronic, transaction (SET) System Security: Introductory idea of Intrusion,
Intrusion detection, Viruses and related threats, firewalls
Text Books
Behrouz A. Frouzan: Cryptography and Network Security, Tata McGraw Hill

William Stallings, “Cryptography and Network Security: Principals and Practice”, Pearson

Standard books in the subject area

C K Shyamala, N Harini, Dr. T.R.Padmnabhan Cryptography and Security ,Wiley Bruce

Schiener, “Applied Cryptography”. John Wiley & Sons
Bernard Menezes,” Network Security and Cryptography”, Cengage Learning. Atul
Kahate, “Cryptography and Network Security”, Tata McGraw Hill


1 2 3 4 5 6 7 8 9
9:30 10:20 11:10 12:00 12:50 1:40 2:20 3:20 4:10
Lecture Plan

Main Topic Sub- topics/Key points References(Reference Remarks

Sl. (as per syllabus) (as per delivery of lecture) no./ pageno.)**
1 Introduction to Security Services- Authentication, William Stallings/ 4-10
attacks, services and Confidentiality and Data Integrity.
mechanisms. Mechanisms 11
Security attacks 11-14
2 Introduction to Introduction William Stallings/ 24
3 Conventional Encryption Symmetric Cipher model, William Stallings/ 24 -
Model Cryptography, 30
4 Classical Encryption Substitution ciphers, caeser cipher, William Stallings/ 30
Techniques monoalphabetic cipher,
polyalphabetic cipher 32
5 Transposition Cipher Transposition Techniques William Stallings/ 44

6 Stream And Block Stream and Block Ciphers William Stallings/ 63
Simplified Des
Block Cipher Principles 56
7 Block Cipher Principles Fiestel Cipher William Stallings/ 64,

Diffusion and Confusion 66

DES 72

8 Block Cipher Principles Strength of DES William Stallings/ 82

9 Block Cipher Principles Differential and linear cryptanalysis William Stallings/ 83

of DES
10 Block Cipher Modes Of Electronic Code Book, William Stallings/ 90
Cipher Block chaining mode, 91
cipher feedback mode4
11 Output feedback mode, William Stallings/ 94

Counter mode 97
12 Confidentiality using Placement of Encryption function William Stallings/ 202
conventional Encryption

13 Traffic Confidentiality William Stallings/ 210

Key Distribution 211

Random Number generation 220

14 Introduction to Groups, Groups, Rings and Fields William Stallings/ 104
rings and fields
15 Modular Arithmetic Divisors, William Stallings/ 109

Modular arithmetic operations, 110

Properties of modular Arithmetic

16 Euclid’s theorem GCD, William Stallings/ 115

Prime Numbers 236

17 Modular Arithmetic Fermat’s and Euler’s Theorem William Stallings/ 239

Testing for Primality

18 Modular Arithmetic Chinese remainder theorem, William Stallings/ 245

Discrete Logarithms
19 Principles of Public Key Principles of Public Key William Stallings/ 259
Cryptography Cryptography
20 RSA Algorithm RSA, William Stallings/ 268

Security of RSA 274

21 Key Management Distribution of Keys William Stallings/ 286

22 Key Management Public key distribution of secret keys William Stallings/ 291

23 Key Management Diffie-Hellman Key Exchange William Stallings/ 293

Elliptic curve Arithmetic
24 Message Authentication Authentication Requirements William Stallings/ 312
and Hash functions
Authentication Functions
25 Message Authentication Message Authentication Code, William Stallings/ 318,
and Hash functions 324

26 Message Authentication Hash Function William Stallings/ 321,

and Hash functions 328
27 Security of Hash Functions and William Stallings/ 335

Birthday Attacks 332

28 Hash Algorithms MD5 message digest Algorithm William Stallings/ 348

29 Hash Algorithms Secure Hash Algorithm William Stallings/ 357

30 Digital Signatures Digital signatures William Stallings/ 380

31 Digital Signatures Authentication Protocols William Stallings/ 384

32 Digital signatutes DSS William Stallings/ 392

33 Authentication Kerberos William Stallings/ 402

34 X.509 William Stallings/ 419

35 Electronic Mail Security PGP William Stallings/ 436

36 S/MIME William Stallings/ 455

37 IP Security Introduction, William Stallings/ 482

Architecture 485
38 Authentication Header William Stallings/ 491

39 Encapsulating security payload William Stallings/ 496

40 Combining Security Associations William Stallings/ 501

41 Web Security Introduction William Stallings/ 528

42 Secure Socket layer and transport William Stallings/ 531
layer security

Security Electronic transaction 548

43 System Security Intruders William Stallings/ 566

Viruses and related Threats 598

44 Firewalls design principles, William Stallings/ 616

Trusted systems
Department of Computer Science & Engineering
IEC Group of Institutions, Greater Noida