&KDSWHU 0DQDJHPHQWLQ$TXDFXOWXUH · 1 4 1 1 1 1 1 1 1 1 1 ï1 ¢ ð1 ð1 1 ¢ 1 1 1 1 1 1 1 1 1 1 1 1
rptIpPrintNew(1)
-
Upload
simran-chauhan -
Category
Documents
-
view
11 -
download
0
Transcript of rptIpPrintNew(1)
-
Lovely Professional University, PunjabCourse Code Course Title Course Planner Lectures Tutorials Practicals CreditsCSEP506 NETWORK SECURITY AND CRYPTOGRAPHY 15681::Sangeeta Sharma 2.0 0.0 0.0 3.0Course Category Courses with Research focus
TextBooks Sr No Title Author Edition Year Publisher NameT-1 Cryptography and Network Security William Stallings 5th 2011 Pearson Education
Reference BooksSr No Title Author Edition Year Publisher NameR-1 Cryptography and Network Security Behrouz Forouzan,
Debdeep Mukhopadhyay2nd 2010 Mc graw Hill
R-2 Cryptography & Security C K Shyamala, N Harini and Dr T R Padmanabhan
1st 2011 Wiley
R-3 Cryptography and Network Security Atul Kahate 1st 2007 Tata McGraw HillR-4 Applied Cryptography Bruce Schneier 2nd Wiley
Other Reading
Sr No Journals articles as Compulsary reading (specific articles, complete reference)OR-1 Bellovin. S. and Cheswick W. ,Network Firewalls, IEEE communication Magazine ,
OR-2 Jurisic A. and Menezes A. ,Elliptical curves & Cryptography, Dr. Dobbs Journals ,
OR-3 Chess D., The Future of viruses on the internet. Proceedings, virus bulletin International conference ,
OR-4 Anderson J., Computer security Threat monitoring and surveillance, Fort Washington, P.A.James P. Anderson Co. ,
Relevant WebsitesSr No (Web address) (only if relevant to the course) Salient FeaturesRW-1 http://fag.grm.hia.no/IKT7000/litteratur/paper/x800.pdf OSI security architecture of different layers
RW-2 http://www.rsa.com/rsalabs/node.asp?id=2262 Key management and its uses
RW-3 http://people.csail.mit.edu/rivest/Rsapaper.pdf Digital signature and its purpose to use
RW-4 http://nptel.iitm.ac.in/courses/106105031/ Video Lecture
LTP week distribution: (LTP Weeks)Weeks before MTE 10
-
Week Number
Lecture Number
Broad Topic(Sub Topic) Chapters/Sections of Text/reference books
Other Readings,Relevant Websites, Audio Visual Aids, software and Virtual Labs
Lecture Description Learning Outcomes Pedagogical ToolDemonstration/ Case Study / Images / animation / ppt etc. Planned
Week 1 Lecture 1 Overview(Computer Security Concepts, Security Attacks, Security Services)
T-1:1- 1.1 1.2 1.3 1.4 1.5
OR-4RW-4
Introduction to Networksecurity.
Students will getknowledge aboutvarious security attacksand services.
Images from slides andvideo lectures can beused.
Lecture 2 Overview(Computer Security Concepts, Security Attacks, Security Services)
T-1:1- 1.1 1.2 1.3 1.4 1.5
OR-4RW-4
Introduction to Networksecurity.
Students will getknowledge aboutvarious security attacksand services.
Images from slides andvideo lectures can beused.
Week 2 Lecture 3 Classical Encryption Techniques and Block Ciphers(Symmetric Cipher Model,Substitution Techniques, Block Cipher Principles, The Data Encryption Standard, DES Example.)
T-1:2- 2.1 2.2 2.3 RW-4 To teach about thevarious substitutiontechniques and workingof block ciphers alongwith DES.
Students will learnabout the substitutiontechniques and blockciphers.
Images from slides and video lectures can be used.
Lecture 4 Classical Encryption Techniques and Block Ciphers(Symmetric Cipher Model,Substitution Techniques, Block Cipher Principles, The Data Encryption Standard, DES Example.)
T-1:2- 2.1 2.2 2.3 RW-4 To teach about thevarious substitutiontechniques and workingof block ciphers alongwith DES.
Students will learnabout the substitutiontechniques and blockciphers.
Images from slides and video lectures can be used.
Week 3 Lecture 5 Classical Encryption Techniques and Block Ciphers(Symmetric Cipher Model,Substitution Techniques, Block Cipher Principles, The Data Encryption Standard, DES Example.)
T-1:2- 2.1 2.2 2.3 RW-4 To teach about thevarious substitutiontechniques and workingof block ciphers alongwith DES.
Students will learnabout the substitutiontechniques and blockciphers.
Images from slides and video lectures can be used.
Lecture 6 Classical Encryption Techniques and Block Ciphers(Symmetric Cipher Model,Substitution Techniques, Block Cipher Principles, The Data Encryption Standard, DES Example.)
T-1:2- 2.1 2.2 2.3 RW-4 To teach about thevarious substitutiontechniques and workingof block ciphers alongwith DES.
Students will learnabout the substitutiontechniques and blockciphers.
Images from slides and video lectures can be used.
Week 4 Lecture 7 Basic Concepts in Number Theory and Finite Fields(Divisibility and the Division Algorithm Algorithm, The Euclidean Algorithm, Modular Arithmetic.)
T-1:4- 4.1 4.2 4.3 4.4 4.5 4.6 4.7
RW-4 To provide knowledge ofnumber theory andalgorithms used forcalculations incryptography.
Students will learnabout the mathematicsused in cryptography.
Images from slides andvideo lectures can beused.
Detailed Plan For Lectures
Weeks After MTE 10
Spill Over 1
-
Week 4 Lecture 8 Basic Concepts in Number Theory and Finite Fields(Divisibility and the Division Algorithm Algorithm, The Euclidean Algorithm, Modular Arithmetic.)
T-1:4- 4.1 4.2 4.3 4.4 4.5 4.6 4.7
RW-4 To provide knowledge ofnumber theory andalgorithms used forcalculations incryptography.
Students will learnabout the mathematicsused in cryptography.
Images from slides andvideo lectures can beused.
Week 5 Lecture 10 Basic Concepts in Number Theory and Finite Fields(Divisibility and the Division Algorithm Algorithm, The Euclidean Algorithm, Modular Arithmetic.)
T-1:4- 4.1 4.2 4.3 4.4 4.5 4.6 4.7
RW-4 To provide knowledge ofnumber theory andalgorithms used forcalculations incryptography.
Students will learnabout the mathematicsused in cryptography.
Images from slides andvideo lectures can beused.
Lecture 9 Basic Concepts in Number Theory and Finite Fields(Divisibility and the Division Algorithm Algorithm, The Euclidean Algorithm, Modular Arithmetic.)
T-1:4- 4.1 4.2 4.3 4.4 4.5 4.6 4.7
RW-4 To provide knowledge ofnumber theory andalgorithms used forcalculations incryptography.
Students will learnabout the mathematicsused in cryptography.
Images from slides andvideo lectures can beused.
Week 6 Lecture 11 Advanced Encryption Standard(AES Structure, AES Transformation Functions, AES Key Expansion, AES Example)
T-1:5- 5.2 5.3 5.4 RW-4 To teach about thefunctioning of AES withexample.
Students will learnabout the AESprocessing.
Images from slides andvideo lectures can beused.
Lecture 12 Advanced Encryption Standard(AES Structure, AES Transformation Functions, AES Key Expansion, AES Example)
T-1:5- 5.2 5.3 5.4 RW-4 To teach about thefunctioning of AES withexample.
Students will learnabout the AESprocessing.
Images from slides andvideo lectures can beused.
Week 7 Lecture 13 Block Cipher Operation and Stream Ciphers(Electronic Code Book, Cipher Block Chaining Mode, Cipher Feedback Mode, Output Feedback Mode, Counter Mode, Stream Ciphers and RC4)
T-1:6- 6.1 6.2 6.3 6.4 6.5 6.6
RW-4 To teach the variousmodes of operations ofblock ciphers usingappropriate diagrams.
Students will learnabout Block ciphersmodes f operation andwill understand thedifference betweenthem.
Images from slides andvideo lectures can beused.
Lecture 14 Introduction to Number Theory(Prime Numbers, Fermat's and Euler's Theorem)
T-1:8- 8.1 8.2 RW-4 To teach the concepts ofnumber theory used incryptography.
Students will learnabout the basicmathematical theoremsused in cryptography.
Images from slides andvideo lectures can beused.
Week 8 Lecture 15 Term Paper,Quiz,Test1Lecture 16 Public-Key Cryptography and
RSA, Other Public-Key Cryptosystems(Principles of Public Key Cryptosystems, RSA Algorithm, Diffie Hellman Key Exchange.)
T-1:9- 9.1 9.2; 10 - 10.1
RW-4 To teach the concepts ofpublic key cryptographyand related algorithms.
Students will learnabout the differencebetween public andprivate keycryptography.
Images from slides andvideo lectures can beused.
Week 9 Lecture 17 Cryptographic Hash Functions(Applications of Cryptographic Hash Functions, Requirements and Security, Secure Hash Algorithm , SHA-3)
T-1:11- 11.1 11.5 RW-4 To teach about hashfunctions, their uses andexample algorithm usedto generate hash code.
Students will learn theuse and importance ofhash codes in electronicworld.
Images from slides andvideo lectures can beused.
-
Week 9 Lecture 18 Cryptographic Hash Functions(Applications of Cryptographic Hash Functions, Requirements and Security, Secure Hash Algorithm , SHA-3)
T-1:11- 11.1 11.5 RW-4 To teach about hashfunctions, their uses andexample algorithm usedto generate hash code.
Students will learn theuse and importance ofhash codes in electronicworld.
Images from slides andvideo lectures can beused.
Week 10 Lecture 19 Cryptographic Hash Functions(Applications of Cryptographic Hash Functions, Requirements and Security, Secure Hash Algorithm , SHA-3)
T-1:11- 11.1 11.5 RW-4 To teach about hashfunctions, their uses andexample algorithm usedto generate hash code.
Students will learn theuse and importance ofhash codes in electronicworld.
Images from slides andvideo lectures can beused.
Lecture 20 Cryptographic Hash Functions(Applications of Cryptographic Hash Functions, Requirements and Security, Secure Hash Algorithm , SHA-3)
T-1:11- 11.1 11.5 RW-4 To teach about hashfunctions, their uses andexample algorithm usedto generate hash code.
Students will learn theuse and importance ofhash codes in electronicworld.
Images from slides andvideo lectures can beused.
MID-TERMWeek 11 Lecture 21 Digital Signatures(Digital
Signatures, Elagamal Digital Signature Scheme)
T-1:13- 13.1 13.2 RW-2RW-3RW-4
To teach about the usesof Digital signatures incryptography and anexample of algorithmused to generate digitalsignature.
Students will learn thegeneration of digitalsignatures and itsimportance in electronicworld.
Images from slides andvideo lectures can beused.
Lecture 22 Digital Signatures(Digital Signatures, Elagamal Digital Signature Scheme)
T-1:13- 13.1 13.2 RW-2RW-3RW-4
To teach about the usesof Digital signatures incryptography and anexample of algorithmused to generate digitalsignature.
Students will learn thegeneration of digitalsignatures and itsimportance in electronicworld.
Images from slides andvideo lectures can beused.
Week 12 Lecture 23 Digital Signatures(Digital Signatures, Elagamal Digital Signature Scheme)
T-1:13- 13.1 13.2 RW-2RW-3RW-4
To teach about the usesof Digital signatures incryptography and anexample of algorithmused to generate digitalsignature.
Students will learn thegeneration of digitalsignatures and itsimportance in electronicworld.
Images from slides andvideo lectures can beused.
Lecture 24 Digital Signatures(Digital Signatures, Elagamal Digital Signature Scheme)
T-1:13- 13.1 13.2 RW-2RW-3RW-4
To teach about the usesof Digital signatures incryptography and anexample of algorithmused to generate digitalsignature.
Students will learn thegeneration of digitalsignatures and itsimportance in electronicworld.
Images from slides andvideo lectures can beused.
Week 13 Lecture 25 Digital Signatures(Digital Signatures, Elagamal Digital Signature Scheme)
T-1:13- 13.1 13.2 RW-2RW-3RW-4
To teach about the usesof Digital signatures incryptography and anexample of algorithmused to generate digitalsignature.
Students will learn thegeneration of digitalsignatures and itsimportance in electronicworld.
Images from slides andvideo lectures can beused.
-
Week 13 Lecture 26 Digital Signatures(Digital Signatures, Elagamal Digital Signature Scheme)
T-1:13- 13.1 13.2 RW-2RW-3RW-4
To teach about the usesof Digital signatures incryptography and anexample of algorithmused to generate digitalsignature.
Students will learn thegeneration of digitalsignatures and itsimportance in electronicworld.
Images from slides andvideo lectures can beused.
Week 14 Lecture 27 Digital Signatures(Digital Signatures, Elagamal Digital Signature Scheme)
T-1:13- 13.1 13.2 RW-2RW-3RW-4
To teach about the usesof Digital signatures incryptography and anexample of algorithmused to generate digitalsignature.
Students will learn thegeneration of digitalsignatures and itsimportance in electronicworld.
Images from slides andvideo lectures can beused.
Lecture 28 Term Paper,Quiz,Test2Week 15 Lecture 29 Electronic Mail Security, IP
Security(Pretty Good Privacy, IP Security Overview and Policy, Encapsulating Security Payload, Combining Security Associations)
T-1:18- 18.1; 19- 19.1 19.2 19.3 19.4
RW-4 To teach about securityrequirements in emailsand how it is providedalong with theimportance of IPSec.
Students will learnabout the variousmethods of providingsecurity in online datatransmissions done bythem.
Images from slides andvideo lectures can beused.
Lecture 30 Electronic Mail Security, IP Security(Pretty Good Privacy, IP Security Overview and Policy, Encapsulating Security Payload, Combining Security Associations)
T-1:18- 18.1; 19- 19.1 19.2 19.3 19.4
RW-4 To teach about securityrequirements in emailsand how it is providedalong with theimportance of IPSec.
Students will learnabout the variousmethods of providingsecurity in online datatransmissions done bythem.
Images from slides andvideo lectures can beused.
Week 16 Lecture 31 Electronic Mail Security, IP Security(Pretty Good Privacy, IP Security Overview and Policy, Encapsulating Security Payload, Combining Security Associations)
T-1:18- 18.1; 19- 19.1 19.2 19.3 19.4
RW-4 To teach about securityrequirements in emailsand how it is providedalong with theimportance of IPSec.
Students will learnabout the variousmethods of providingsecurity in online datatransmissions done bythem.
Images from slides andvideo lectures can beused.
Lecture 32 Electronic Mail Security, IP Security(Pretty Good Privacy, IP Security Overview and Policy, Encapsulating Security Payload, Combining Security Associations)
T-1:18- 18.1; 19- 19.1 19.2 19.3 19.4
RW-4 To teach about securityrequirements in emailsand how it is providedalong with theimportance of IPSec.
Students will learnabout the variousmethods of providingsecurity in online datatransmissions done bythem.
Images from slides andvideo lectures can beused.
Week 17 Lecture 33 Electronic Mail Security, IP Security(Pretty Good Privacy, IP Security Overview and Policy, Encapsulating Security Payload, Combining Security Associations)
T-1:18- 18.1; 19- 19.1 19.2 19.3 19.4
RW-4 To teach about securityrequirements in emailsand how it is providedalong with theimportance of IPSec.
Students will learnabout the variousmethods of providingsecurity in online datatransmissions done bythem.
Images from slides andvideo lectures can beused.
Lecture 34 Key Management and Distribution, User Authentication(Distribution of symmetric keys using symmetric encryption and asymmetric encryption, Distribution of Public Keys.)
T-1:14- 14.1 14.2 14.3 14.4; 15- 15.1
15.2 15.3
RW-4 To teach about thegeneration anddistribution of publickeys and symmetric keysas well as theirmanagement.
Students will learn thedifference betweensymmetric keys andasymmetric keycryptography.
Images from slides andvideo lectures can beused.
-
Week 18 Lecture 35 Key Management and Distribution, User Authentication(Distribution of symmetric keys using symmetric encryption and asymmetric encryption, Distribution of Public Keys.)
T-1:14- 14.1 14.2 14.3 14.4; 15- 15.1
15.2 15.3
RW-4 To teach about thegeneration anddistribution of publickeys and symmetric keysas well as theirmanagement.
Students will learn thedifference betweensymmetric keys andasymmetric keycryptography.
Images from slides andvideo lectures can beused.
Lecture 36 Key Management and Distribution, User Authentication(Distribution of symmetric keys using symmetric encryption and asymmetric encryption, Distribution of Public Keys.)
T-1:14- 14.1 14.2 14.3 14.4; 15- 15.1
15.2 15.3
RW-4 To teach about thegeneration anddistribution of publickeys and symmetric keysas well as theirmanagement.
Students will learn thedifference betweensymmetric keys andasymmetric keycryptography.
Images from slides andvideo lectures can beused.
Week 19 Lecture 37 Key Management and Distribution, User Authentication(Distribution of symmetric keys using symmetric encryption and asymmetric encryption, Distribution of Public Keys.)
T-1:14- 14.1 14.2 14.3 14.4; 15- 15.1
15.2 15.3
RW-4 To teach about thegeneration anddistribution of publickeys and symmetric keysas well as theirmanagement.
Students will learn thedifference betweensymmetric keys andasymmetric keycryptography.
Images from slides andvideo lectures can beused.
Lecture 38 Key Management and Distribution, User Authentication(Distribution of symmetric keys using symmetric encryption and asymmetric encryption, Distribution of Public Keys.)
T-1:14- 14.1 14.2 14.3 14.4; 15- 15.1
15.2 15.3
RW-4 To teach about thegeneration anddistribution of publickeys and symmetric keysas well as theirmanagement.
Students will learn thedifference betweensymmetric keys andasymmetric keycryptography.
Images from slides andvideo lectures can beused.
Week 20 Lecture 39 Key Management and Distribution, User Authentication(Distribution of symmetric keys using symmetric encryption and asymmetric encryption, Distribution of Public Keys.)
T-1:14- 14.1 14.2 14.3 14.4; 15- 15.1
15.2 15.3
RW-4 To teach about thegeneration anddistribution of publickeys and symmetric keysas well as theirmanagement.
Students will learn thedifference betweensymmetric keys andasymmetric keycryptography.
Images from slides andvideo lectures can beused.
Lecture 40 Key Management and Distribution, User Authentication(Distribution of symmetric keys using symmetric encryption and asymmetric encryption, Distribution of Public Keys.)
T-1:14- 14.1 14.2 14.3 14.4; 15- 15.1
15.2 15.3
RW-4 To teach about thegeneration anddistribution of publickeys and symmetric keysas well as theirmanagement.
Students will learn thedifference betweensymmetric keys andasymmetric keycryptography.
Images from slides andvideo lectures can beused.
SPILL OVERWeek 11 Lecture 21 Spill Over
Scheme for CA:Component Frequency Out Of Each Marks Total Marks
Term Paper,Quiz,Test 2 3 10 20Total :- 10 20
Details of Academic Task(s)
-
AT No. Objective Topic of the Academic Task Nature of Academic Task(group/individuals/field
work
Evaluation Mode Allottment / submission Week
Term Paper1 Understanding how to write a technical paper.
A topic will be assigned to each student on which proper study will be carried out by the students and the conclusions will be presented in the form of a technical paper.
Individual Based on the student's performance in the completion of the term paper.
4 / 15
Quiz1 To test the knowledge of students based on the lectures taught till lecture 10.
A quiz that consists multiple choice questions, fill in the blanks and one work answers. Multiple set of questions must be prepared to avoid cheating during the quiz.
Individual Evaluation on the basis of performance of the students in the quiz
7 / 8
Test1 To test the knowledge of students based on the lectures taught till lecture 19.
A test that consists short answer type and long answer type questions.
Individual Evaluation on the basis of performance of the student in the test.
12 / 13
List of suggested topics for term paper[at least 15] (Student to spend about 15 hrs on any one specified term paper)
Sr. No. Topic
1 Advanced Encryption Standard
2 Diffie-Hellman Key Exchange
3 Elliptic Curve Cryptography
4 Block Ciphers and the Data Encryption Standard
5 Digital Signature Standard
6 Digital Signatures Authentication Protocols
7 Security Problems in the TCP/IP Protocol Suite
8 Privacy Enhancement for Internet Electronic Mail
9 Kerberos
10 Pretty Good Privacy
11 IP Security Architecture
12 Secure Electronic Transaction
13 Secure Socket Layer
14 Language based security
15 Block Cipher Design Principles
16 Message Authentication
17 The Code Red Worm
-
18 Academic Freedom and the Hacker Ethic
19 SNORT Intrusion Detection System
20 Achieving Electronic Privacy
21 The tiny encryption algorithm
22 The Block Cipher Square
23 Tiger: A fast new hash function
24 Data Encryption Standard