Académique Documents
Professionnel Documents
Culture Documents
Format For Instruction Plan [for Courses with Lectures and Labs Course No CSE403T Course Category Cours Title NETWORK SECURITY AND CRYPTOGRAPHY Courses with conceptual focus / presentation component Course Planner 15681 :: Sangeeta Sharma Lectures Tutorial Practical Credits 4 0 0 4
Text Book:
2 Security in Computing (Second Edition)', Charles P.Pfleeger, 1996, Prentice Hall International, Inc. 3 Cryptography & Network Security, Atul Kahate, TMH 4 Cryptography & Security , C K Shyamala, N Harini and Dr T R Padmanabhan 2011 ,Wiley-India 5 Applied Cryptography: Protocols, Algorithms, and Source Code in C, Bruce Schneier, John Wiley and Sons 6 Firewalls and Internet Security, Bill Cheswick and Steve Bellovin, Addison-Wesley 7 Security Technologies for the world wide web, Rolf Oppliger, Artech House, Inc.
Other Reading Sr No Jouranls atricles as compulsary readings (specific articles, Complete reference) 8 Bellovin. S. and Cheswick W. Network Firewalls, IEEE communication Magazine 9 Jurisic, A. And Menezes, A. Elliptical curves & Cryptography, Dr. Dobbs Journals 10 Chess, D. The Future of viruses on the internet. Proceedings, virus bulletin International conference 11 Anderson, J. Computer security Threat monitoring and surveillance. Fort Washington, P.A.James P. Anderson Co. Relevant Websites
Sr. No. (Web adress) (only if relevant to the courses) 12 http://fag.grm.hia.no/IKT7000/litteratur/paper/x800.pdf 13 http://www.rsa.com/rsalabs/node.asp?id=2262 14 http://people.csail.mit.edu/rivest/Rsapaper.pdf
Salient Features OSI security architecture of different layers Key management and its uses Digital signature and its purpose to use
Part 1
Week 1 Lecture 1 Overview: Computer Security Concepts ->Reference :1,Ch 11.1 Slides contain data and images from William Stallings and are already uploaded under Course Files. Slides contain data and images from William Stallings and are already uploaded under Course Files. Slides contain data and images from William Stallings and are already uploaded under Course Files. Slides contain data and images from William Stallings and are already uploaded under Course Files. Slides contain data and images from William Stallings and are already uploaded under Course Files.
Lecture 2
Lecture 3
Lecture 4
Week 2
Lecture 5
Week 2
Lecture 6
Slides contain data and images from William Stallings and are already uploaded under Course Files. Slides contain data and images from William Stallings and are already uploaded under Course Files. Slides contain data and images from William Stallings and are already uploaded under Course Files. Slides contain data and images from William Stallings and are already uploaded under Course Files. Slides contain data and images from William Stallings and are already uploaded under Course Files. Slides contain data and images from William Stallings and are already uploaded under Course Files. Slides contain data and images from William Stallings and are already uploaded under Course Files. Slides contain data and images from William Stallings and are already uploaded under Course Files.
Lecture 7
Lecture 8
Transposition Techniques
Week 3
Lecture 9
Block Ciphers and the Data Encryption Standard: Block Cipher Principles
Lecture 10
Lecture 11
Lecture 12
The Strength of Des, Differential and Linear Cryptanalysis,Block Cipher Design Principles
Week 4
Lecture 13
Basic Concepts in Number Theory and Finite Fields: ->Reference :1,Ch 4Divisibility and the Division Algorithm, The Euclidean 4.1-4.2 Algorithm
Part 2
Week 4 Lecture 14 Groups, Rings and Fields, Finite Fields of The Form ->Reference :1,Ch 4GF(p) 4.4-4.5 Slides contain data and images from William Stallings and are already uploaded under Course Files. Slides contain data and images from William Stallings and are already uploaded under Course Files. Slides contain data and images from William Stallings and are already uploaded under Course Files. Slides contain data and images from William Stallings and are already uploaded under Course Files. Slides contain data and images from William Stallings and are already uploaded under Course Files. Slides contain data and images from William Stallings and are already uploaded under Course Files. Slides contain data and images from William Stallings and are already uploaded under Course Files. Slides contain data and images from William Stallings and are already uploaded under Course Files.
Lecture 15
Polynomial Arithmetic, Finite Fields Of the Form GF ->Reference :1,Ch 4(2n) 4.6-4.7
Lecture 16
Week 5
Lecture 17
Lecture 18
Lecture 19
Lecture 20
Electronic Code Book, Cipher Block Chaining, Cipher Feedback mode, Output Feedback mode, Counter mode
Week 6
Lecture 21
XTS- AES Mode for Block Oriented Storage Devices ->Reference :1,Ch 66.7
Week 6
Lecture 22
Pseudorandom Number Generation and Stream Cipher: Principles of Pseudorandom Number Generation
Slides contain data and images from William Stallings and are already uploaded under Course Files. Slides contain data and images from William Stallings and are already uploaded under Course Files. Slides contain data and images from William Stallings and are already uploaded under Course Files. Slides contain data and images from William Stallings and are already uploaded under Course Files. Slides contain data and images from William Stallings and are already uploaded under Course Files. Slides contain data and images from William Stallings and are already uploaded under Course Files.
Lecture 23
Pseudorandom number generators, Pseudorandom ->Reference :1,Ch 7Number Generation using a block cipher 7.2-7.3
Lecture 24
Week 7
Lecture 25
Lecture 26
Lecture 27
Lecture 28
->Reference :1,Ch 10- Slides contain data and 10.1 images from William Stallings and are already uploaded under Course Files.
MID-TERM Part 3
Week 8 Lecture 29 Public-Key Cryptography and RSA: Diffie- Hellman key exchange ->Reference :1,Ch 10- Slides contain data and 10.1 images from William Stallings and are already uploaded under Course Files.
Week 8
Lecture 30
->Reference :1,Ch 10- Slides contain data and 10.2;10.5 images from William Stallings and are already uploaded under Course Files. ->Reference :1,Ch 11- Slides contain data and 11.1-11.2 images from William Stallings and are already uploaded under Course Files. ->Reference :1,Ch 11- Slides contain data and 11.3-11.4 images from William Stallings and are already uploaded under Course Files. ->Reference :1,Ch 11- Slides contain data and 11.5 images from William Stallings and are already uploaded under Course Files. ->Reference :1,Ch 11- Slides contain data and 11.5-11.6 images from William Stallings and are already uploaded under Course Files. ->Reference :1,Ch 12- Slides contain data and 12.1-12.2 images from William Stallings and are already uploaded under Course Files. ->Reference :1,Ch 12- Slides contain data and 12.3-12.5 images from William Stallings and are already uploaded under Course Files.
Lecture 31
Cryptographic Hash Functions: Applications od Cryptographic Hash functions, Two Simple Hash functions
Lecture 32
Week 9
Lecture 33
SHA
Lecture 34
SHA(Cont.), SHA-3
Lecture 35
Lecture 36
Week 10
Lecture 37
HMAC(Cont.), MACs based on Block Ciphers: DAA ->Reference :1,Ch 12- Slides contain data and and CMAC 12.5-12.6 images from William Stallings and are already uploaded under Course Files. Digital Signatures, ElGamal Digital Signature Scheme ->Reference :1,Ch 13- Slides contain data and 13.1-13.2 images from William Stallings and are already uploaded under Course Files. Approved for Spring Session 2011-12
Lecture 38
Week 10
Lecture 39
Schnorr Digital Signature Scheme, Digital Signature ->Reference :1,Ch 13- Slides contain data and Standard 13.3-13.4 images from William Stallings and are already uploaded under Course Files.
Part 4
Week 10 Lecture 40 Key Management and Distribution: Symmetric Key Distribution Using Symmetric Encryption ->Reference :1,Ch 14- Slides contain data and 14.1 images from William Stallings and are already uploaded under Course Files. ->Reference :1,Ch 14- Slides contain data and 14.2-14.3 images from William Stallings and are already uploaded under Course Files. ->Reference :1,Ch 14- Slides contain data and 14.4 images from William Stallings and are already uploaded under Course Files. ->Reference :1,Ch 14- Slides contain data and 14.5 images from William Stallings and are already uploaded under Course Files. Slides contain data and images from William Stallings and are already uploaded under Course Files. ->Reference :1,Ch 15- Slides contain data and 15.1-15.2 images from William Stallings and are already uploaded under Course Files. ->Reference :1,Ch 15- Slides contain data and 15.4-15.5 images from William Stallings and are already uploaded under Course Files.
Week 11
Lecture 41
Lecture 42
X.509 Certificates
Lecture 43
Public-Key Infrastructure
Lecture 44
Week 12
Lecture 45
User Authentication: Remote User Authentication Principles, Remote User Authentication using Symmetric Encryption
Lecture 46
Week 12
Lecture 47
->Reference :1,Ch 18- Slides contain data and 18.1 images from William Stallings and are already uploaded under Course Files. ->Reference :1,Ch 18- Slides contain data and 18.2 images from William Stallings and are already uploaded under Course Files. ->Reference :1,Ch 19- Slides contain data and 19.1-19.2 images from William Stallings and are already uploaded under Course Files. ->Reference :1,Ch 19- Slides contain data and 19.3-19.4 images from William Stallings and are already uploaded under Course Files. ->Reference :1,Ch 20- Slides contain data and 20.1-20.3 images from William Stallings and are already uploaded under Course Files. ->Reference :1,Ch 22- Slides contain data and 22.1-22.5 images from William Stallings and are already uploaded under Course Files.
Lecture 48
S/MIME
Week 13
Lecture 49
Lecture 50
Lecture 51
Lecture 52
Firewalls
Spill Over
Week 14 Lecture 53 Kerberos ->Reference :1,Ch 15- Slides contain data and 15.3 images from William Stallings and are already uploaded under Course Files. ->Reference :1,Ch 16- Slides contain data and 16.1-16.3 images from William Stallings and are already uploaded under Course Files.
Lecture 54
Homework 1
To understand the Syllabus for the homework will be the topics covered till week 5. basics of network security and various cryptographic techniques. Understanding how to write a technical paper
Term Paper 1
A topic will be assigned to each student on which proper study will Individual be carried out by the students and the conclusions will be presented in the form of a technical paper.
Based on the student's performance in the completion of the term paper. Based on the student's performance in the test.
3 / 11
Test 1
To test the Syllabus covered till Week 10. knowleadge of the students based on the syllabus taught till week 10.
Individual
11 / 11
* In ENG courses wherever the total exceeds 100, consider x best out of y components of CA, as explained in teacher's guide available on the UMS List of suggested topics for term paper[at least 15] (Student to spend about 15 hrs on any one specified term paper) Sr. No. Topic 1 The Data Encryption Standard 2 Advanced Encryption Standard 3 Diffie-Hellman Key Exchange 4 Elliptic Curve Cryptography
5 Block Ciphers and the Data Encryption Standard 6 Digital Signature Standard 7 Digital Signatures Authentication Protocols 8 Security Problems in the TCP/IP Protocol Suite 9 Privacy Enhancement for Internet Electronic Mail 10 Kerberos 11 Pretty Good Privacy 12 IP Security Architecture 13 Secure Electronic Transaction 14 Secure Socket Layer 15 Language based security 16 Block Cipher Design Principles 17 Message Authentication 18 The Code Red Worm 19 Academic Freedom and the Hacker Ethic 20 SNORT Intrusion Detection System 21 Achieving Electronic Privacy 22 The tiny encryption algorithm 23 The Block Cipher Square 24 Tiger: A fast new hash function
10