rptIpPrintNew(1)

download rptIpPrintNew(1)

of 8

Transcript of rptIpPrintNew(1)

  • Lovely Professional University, PunjabCourse Code Course Title Course Planner Lectures Tutorials Practicals CreditsCSEP506 NETWORK SECURITY AND CRYPTOGRAPHY 15681::Sangeeta Sharma 2.0 0.0 0.0 3.0Course Category Courses with Research focus

    TextBooks Sr No Title Author Edition Year Publisher NameT-1 Cryptography and Network Security William Stallings 5th 2011 Pearson Education

    Reference BooksSr No Title Author Edition Year Publisher NameR-1 Cryptography and Network Security Behrouz Forouzan,

    Debdeep Mukhopadhyay2nd 2010 Mc graw Hill

    R-2 Cryptography & Security C K Shyamala, N Harini and Dr T R Padmanabhan

    1st 2011 Wiley

    R-3 Cryptography and Network Security Atul Kahate 1st 2007 Tata McGraw HillR-4 Applied Cryptography Bruce Schneier 2nd Wiley

    Other Reading

    Sr No Journals articles as Compulsary reading (specific articles, complete reference)OR-1 Bellovin. S. and Cheswick W. ,Network Firewalls, IEEE communication Magazine ,

    OR-2 Jurisic A. and Menezes A. ,Elliptical curves & Cryptography, Dr. Dobbs Journals ,

    OR-3 Chess D., The Future of viruses on the internet. Proceedings, virus bulletin International conference ,

    OR-4 Anderson J., Computer security Threat monitoring and surveillance, Fort Washington, P.A.James P. Anderson Co. ,

    Relevant WebsitesSr No (Web address) (only if relevant to the course) Salient FeaturesRW-1 http://fag.grm.hia.no/IKT7000/litteratur/paper/x800.pdf OSI security architecture of different layers

    RW-2 http://www.rsa.com/rsalabs/node.asp?id=2262 Key management and its uses

    RW-3 http://people.csail.mit.edu/rivest/Rsapaper.pdf Digital signature and its purpose to use

    RW-4 http://nptel.iitm.ac.in/courses/106105031/ Video Lecture

    LTP week distribution: (LTP Weeks)Weeks before MTE 10

  • Week Number

    Lecture Number

    Broad Topic(Sub Topic) Chapters/Sections of Text/reference books

    Other Readings,Relevant Websites, Audio Visual Aids, software and Virtual Labs

    Lecture Description Learning Outcomes Pedagogical ToolDemonstration/ Case Study / Images / animation / ppt etc. Planned

    Week 1 Lecture 1 Overview(Computer Security Concepts, Security Attacks, Security Services)

    T-1:1- 1.1 1.2 1.3 1.4 1.5

    OR-4RW-4

    Introduction to Networksecurity.

    Students will getknowledge aboutvarious security attacksand services.

    Images from slides andvideo lectures can beused.

    Lecture 2 Overview(Computer Security Concepts, Security Attacks, Security Services)

    T-1:1- 1.1 1.2 1.3 1.4 1.5

    OR-4RW-4

    Introduction to Networksecurity.

    Students will getknowledge aboutvarious security attacksand services.

    Images from slides andvideo lectures can beused.

    Week 2 Lecture 3 Classical Encryption Techniques and Block Ciphers(Symmetric Cipher Model,Substitution Techniques, Block Cipher Principles, The Data Encryption Standard, DES Example.)

    T-1:2- 2.1 2.2 2.3 RW-4 To teach about thevarious substitutiontechniques and workingof block ciphers alongwith DES.

    Students will learnabout the substitutiontechniques and blockciphers.

    Images from slides and video lectures can be used.

    Lecture 4 Classical Encryption Techniques and Block Ciphers(Symmetric Cipher Model,Substitution Techniques, Block Cipher Principles, The Data Encryption Standard, DES Example.)

    T-1:2- 2.1 2.2 2.3 RW-4 To teach about thevarious substitutiontechniques and workingof block ciphers alongwith DES.

    Students will learnabout the substitutiontechniques and blockciphers.

    Images from slides and video lectures can be used.

    Week 3 Lecture 5 Classical Encryption Techniques and Block Ciphers(Symmetric Cipher Model,Substitution Techniques, Block Cipher Principles, The Data Encryption Standard, DES Example.)

    T-1:2- 2.1 2.2 2.3 RW-4 To teach about thevarious substitutiontechniques and workingof block ciphers alongwith DES.

    Students will learnabout the substitutiontechniques and blockciphers.

    Images from slides and video lectures can be used.

    Lecture 6 Classical Encryption Techniques and Block Ciphers(Symmetric Cipher Model,Substitution Techniques, Block Cipher Principles, The Data Encryption Standard, DES Example.)

    T-1:2- 2.1 2.2 2.3 RW-4 To teach about thevarious substitutiontechniques and workingof block ciphers alongwith DES.

    Students will learnabout the substitutiontechniques and blockciphers.

    Images from slides and video lectures can be used.

    Week 4 Lecture 7 Basic Concepts in Number Theory and Finite Fields(Divisibility and the Division Algorithm Algorithm, The Euclidean Algorithm, Modular Arithmetic.)

    T-1:4- 4.1 4.2 4.3 4.4 4.5 4.6 4.7

    RW-4 To provide knowledge ofnumber theory andalgorithms used forcalculations incryptography.

    Students will learnabout the mathematicsused in cryptography.

    Images from slides andvideo lectures can beused.

    Detailed Plan For Lectures

    Weeks After MTE 10

    Spill Over 1

  • Week 4 Lecture 8 Basic Concepts in Number Theory and Finite Fields(Divisibility and the Division Algorithm Algorithm, The Euclidean Algorithm, Modular Arithmetic.)

    T-1:4- 4.1 4.2 4.3 4.4 4.5 4.6 4.7

    RW-4 To provide knowledge ofnumber theory andalgorithms used forcalculations incryptography.

    Students will learnabout the mathematicsused in cryptography.

    Images from slides andvideo lectures can beused.

    Week 5 Lecture 10 Basic Concepts in Number Theory and Finite Fields(Divisibility and the Division Algorithm Algorithm, The Euclidean Algorithm, Modular Arithmetic.)

    T-1:4- 4.1 4.2 4.3 4.4 4.5 4.6 4.7

    RW-4 To provide knowledge ofnumber theory andalgorithms used forcalculations incryptography.

    Students will learnabout the mathematicsused in cryptography.

    Images from slides andvideo lectures can beused.

    Lecture 9 Basic Concepts in Number Theory and Finite Fields(Divisibility and the Division Algorithm Algorithm, The Euclidean Algorithm, Modular Arithmetic.)

    T-1:4- 4.1 4.2 4.3 4.4 4.5 4.6 4.7

    RW-4 To provide knowledge ofnumber theory andalgorithms used forcalculations incryptography.

    Students will learnabout the mathematicsused in cryptography.

    Images from slides andvideo lectures can beused.

    Week 6 Lecture 11 Advanced Encryption Standard(AES Structure, AES Transformation Functions, AES Key Expansion, AES Example)

    T-1:5- 5.2 5.3 5.4 RW-4 To teach about thefunctioning of AES withexample.

    Students will learnabout the AESprocessing.

    Images from slides andvideo lectures can beused.

    Lecture 12 Advanced Encryption Standard(AES Structure, AES Transformation Functions, AES Key Expansion, AES Example)

    T-1:5- 5.2 5.3 5.4 RW-4 To teach about thefunctioning of AES withexample.

    Students will learnabout the AESprocessing.

    Images from slides andvideo lectures can beused.

    Week 7 Lecture 13 Block Cipher Operation and Stream Ciphers(Electronic Code Book, Cipher Block Chaining Mode, Cipher Feedback Mode, Output Feedback Mode, Counter Mode, Stream Ciphers and RC4)

    T-1:6- 6.1 6.2 6.3 6.4 6.5 6.6

    RW-4 To teach the variousmodes of operations ofblock ciphers usingappropriate diagrams.

    Students will learnabout Block ciphersmodes f operation andwill understand thedifference betweenthem.

    Images from slides andvideo lectures can beused.

    Lecture 14 Introduction to Number Theory(Prime Numbers, Fermat's and Euler's Theorem)

    T-1:8- 8.1 8.2 RW-4 To teach the concepts ofnumber theory used incryptography.

    Students will learnabout the basicmathematical theoremsused in cryptography.

    Images from slides andvideo lectures can beused.

    Week 8 Lecture 15 Term Paper,Quiz,Test1Lecture 16 Public-Key Cryptography and

    RSA, Other Public-Key Cryptosystems(Principles of Public Key Cryptosystems, RSA Algorithm, Diffie Hellman Key Exchange.)

    T-1:9- 9.1 9.2; 10 - 10.1

    RW-4 To teach the concepts ofpublic key cryptographyand related algorithms.

    Students will learnabout the differencebetween public andprivate keycryptography.

    Images from slides andvideo lectures can beused.

    Week 9 Lecture 17 Cryptographic Hash Functions(Applications of Cryptographic Hash Functions, Requirements and Security, Secure Hash Algorithm , SHA-3)

    T-1:11- 11.1 11.5 RW-4 To teach about hashfunctions, their uses andexample algorithm usedto generate hash code.

    Students will learn theuse and importance ofhash codes in electronicworld.

    Images from slides andvideo lectures can beused.

  • Week 9 Lecture 18 Cryptographic Hash Functions(Applications of Cryptographic Hash Functions, Requirements and Security, Secure Hash Algorithm , SHA-3)

    T-1:11- 11.1 11.5 RW-4 To teach about hashfunctions, their uses andexample algorithm usedto generate hash code.

    Students will learn theuse and importance ofhash codes in electronicworld.

    Images from slides andvideo lectures can beused.

    Week 10 Lecture 19 Cryptographic Hash Functions(Applications of Cryptographic Hash Functions, Requirements and Security, Secure Hash Algorithm , SHA-3)

    T-1:11- 11.1 11.5 RW-4 To teach about hashfunctions, their uses andexample algorithm usedto generate hash code.

    Students will learn theuse and importance ofhash codes in electronicworld.

    Images from slides andvideo lectures can beused.

    Lecture 20 Cryptographic Hash Functions(Applications of Cryptographic Hash Functions, Requirements and Security, Secure Hash Algorithm , SHA-3)

    T-1:11- 11.1 11.5 RW-4 To teach about hashfunctions, their uses andexample algorithm usedto generate hash code.

    Students will learn theuse and importance ofhash codes in electronicworld.

    Images from slides andvideo lectures can beused.

    MID-TERMWeek 11 Lecture 21 Digital Signatures(Digital

    Signatures, Elagamal Digital Signature Scheme)

    T-1:13- 13.1 13.2 RW-2RW-3RW-4

    To teach about the usesof Digital signatures incryptography and anexample of algorithmused to generate digitalsignature.

    Students will learn thegeneration of digitalsignatures and itsimportance in electronicworld.

    Images from slides andvideo lectures can beused.

    Lecture 22 Digital Signatures(Digital Signatures, Elagamal Digital Signature Scheme)

    T-1:13- 13.1 13.2 RW-2RW-3RW-4

    To teach about the usesof Digital signatures incryptography and anexample of algorithmused to generate digitalsignature.

    Students will learn thegeneration of digitalsignatures and itsimportance in electronicworld.

    Images from slides andvideo lectures can beused.

    Week 12 Lecture 23 Digital Signatures(Digital Signatures, Elagamal Digital Signature Scheme)

    T-1:13- 13.1 13.2 RW-2RW-3RW-4

    To teach about the usesof Digital signatures incryptography and anexample of algorithmused to generate digitalsignature.

    Students will learn thegeneration of digitalsignatures and itsimportance in electronicworld.

    Images from slides andvideo lectures can beused.

    Lecture 24 Digital Signatures(Digital Signatures, Elagamal Digital Signature Scheme)

    T-1:13- 13.1 13.2 RW-2RW-3RW-4

    To teach about the usesof Digital signatures incryptography and anexample of algorithmused to generate digitalsignature.

    Students will learn thegeneration of digitalsignatures and itsimportance in electronicworld.

    Images from slides andvideo lectures can beused.

    Week 13 Lecture 25 Digital Signatures(Digital Signatures, Elagamal Digital Signature Scheme)

    T-1:13- 13.1 13.2 RW-2RW-3RW-4

    To teach about the usesof Digital signatures incryptography and anexample of algorithmused to generate digitalsignature.

    Students will learn thegeneration of digitalsignatures and itsimportance in electronicworld.

    Images from slides andvideo lectures can beused.

  • Week 13 Lecture 26 Digital Signatures(Digital Signatures, Elagamal Digital Signature Scheme)

    T-1:13- 13.1 13.2 RW-2RW-3RW-4

    To teach about the usesof Digital signatures incryptography and anexample of algorithmused to generate digitalsignature.

    Students will learn thegeneration of digitalsignatures and itsimportance in electronicworld.

    Images from slides andvideo lectures can beused.

    Week 14 Lecture 27 Digital Signatures(Digital Signatures, Elagamal Digital Signature Scheme)

    T-1:13- 13.1 13.2 RW-2RW-3RW-4

    To teach about the usesof Digital signatures incryptography and anexample of algorithmused to generate digitalsignature.

    Students will learn thegeneration of digitalsignatures and itsimportance in electronicworld.

    Images from slides andvideo lectures can beused.

    Lecture 28 Term Paper,Quiz,Test2Week 15 Lecture 29 Electronic Mail Security, IP

    Security(Pretty Good Privacy, IP Security Overview and Policy, Encapsulating Security Payload, Combining Security Associations)

    T-1:18- 18.1; 19- 19.1 19.2 19.3 19.4

    RW-4 To teach about securityrequirements in emailsand how it is providedalong with theimportance of IPSec.

    Students will learnabout the variousmethods of providingsecurity in online datatransmissions done bythem.

    Images from slides andvideo lectures can beused.

    Lecture 30 Electronic Mail Security, IP Security(Pretty Good Privacy, IP Security Overview and Policy, Encapsulating Security Payload, Combining Security Associations)

    T-1:18- 18.1; 19- 19.1 19.2 19.3 19.4

    RW-4 To teach about securityrequirements in emailsand how it is providedalong with theimportance of IPSec.

    Students will learnabout the variousmethods of providingsecurity in online datatransmissions done bythem.

    Images from slides andvideo lectures can beused.

    Week 16 Lecture 31 Electronic Mail Security, IP Security(Pretty Good Privacy, IP Security Overview and Policy, Encapsulating Security Payload, Combining Security Associations)

    T-1:18- 18.1; 19- 19.1 19.2 19.3 19.4

    RW-4 To teach about securityrequirements in emailsand how it is providedalong with theimportance of IPSec.

    Students will learnabout the variousmethods of providingsecurity in online datatransmissions done bythem.

    Images from slides andvideo lectures can beused.

    Lecture 32 Electronic Mail Security, IP Security(Pretty Good Privacy, IP Security Overview and Policy, Encapsulating Security Payload, Combining Security Associations)

    T-1:18- 18.1; 19- 19.1 19.2 19.3 19.4

    RW-4 To teach about securityrequirements in emailsand how it is providedalong with theimportance of IPSec.

    Students will learnabout the variousmethods of providingsecurity in online datatransmissions done bythem.

    Images from slides andvideo lectures can beused.

    Week 17 Lecture 33 Electronic Mail Security, IP Security(Pretty Good Privacy, IP Security Overview and Policy, Encapsulating Security Payload, Combining Security Associations)

    T-1:18- 18.1; 19- 19.1 19.2 19.3 19.4

    RW-4 To teach about securityrequirements in emailsand how it is providedalong with theimportance of IPSec.

    Students will learnabout the variousmethods of providingsecurity in online datatransmissions done bythem.

    Images from slides andvideo lectures can beused.

    Lecture 34 Key Management and Distribution, User Authentication(Distribution of symmetric keys using symmetric encryption and asymmetric encryption, Distribution of Public Keys.)

    T-1:14- 14.1 14.2 14.3 14.4; 15- 15.1

    15.2 15.3

    RW-4 To teach about thegeneration anddistribution of publickeys and symmetric keysas well as theirmanagement.

    Students will learn thedifference betweensymmetric keys andasymmetric keycryptography.

    Images from slides andvideo lectures can beused.

  • Week 18 Lecture 35 Key Management and Distribution, User Authentication(Distribution of symmetric keys using symmetric encryption and asymmetric encryption, Distribution of Public Keys.)

    T-1:14- 14.1 14.2 14.3 14.4; 15- 15.1

    15.2 15.3

    RW-4 To teach about thegeneration anddistribution of publickeys and symmetric keysas well as theirmanagement.

    Students will learn thedifference betweensymmetric keys andasymmetric keycryptography.

    Images from slides andvideo lectures can beused.

    Lecture 36 Key Management and Distribution, User Authentication(Distribution of symmetric keys using symmetric encryption and asymmetric encryption, Distribution of Public Keys.)

    T-1:14- 14.1 14.2 14.3 14.4; 15- 15.1

    15.2 15.3

    RW-4 To teach about thegeneration anddistribution of publickeys and symmetric keysas well as theirmanagement.

    Students will learn thedifference betweensymmetric keys andasymmetric keycryptography.

    Images from slides andvideo lectures can beused.

    Week 19 Lecture 37 Key Management and Distribution, User Authentication(Distribution of symmetric keys using symmetric encryption and asymmetric encryption, Distribution of Public Keys.)

    T-1:14- 14.1 14.2 14.3 14.4; 15- 15.1

    15.2 15.3

    RW-4 To teach about thegeneration anddistribution of publickeys and symmetric keysas well as theirmanagement.

    Students will learn thedifference betweensymmetric keys andasymmetric keycryptography.

    Images from slides andvideo lectures can beused.

    Lecture 38 Key Management and Distribution, User Authentication(Distribution of symmetric keys using symmetric encryption and asymmetric encryption, Distribution of Public Keys.)

    T-1:14- 14.1 14.2 14.3 14.4; 15- 15.1

    15.2 15.3

    RW-4 To teach about thegeneration anddistribution of publickeys and symmetric keysas well as theirmanagement.

    Students will learn thedifference betweensymmetric keys andasymmetric keycryptography.

    Images from slides andvideo lectures can beused.

    Week 20 Lecture 39 Key Management and Distribution, User Authentication(Distribution of symmetric keys using symmetric encryption and asymmetric encryption, Distribution of Public Keys.)

    T-1:14- 14.1 14.2 14.3 14.4; 15- 15.1

    15.2 15.3

    RW-4 To teach about thegeneration anddistribution of publickeys and symmetric keysas well as theirmanagement.

    Students will learn thedifference betweensymmetric keys andasymmetric keycryptography.

    Images from slides andvideo lectures can beused.

    Lecture 40 Key Management and Distribution, User Authentication(Distribution of symmetric keys using symmetric encryption and asymmetric encryption, Distribution of Public Keys.)

    T-1:14- 14.1 14.2 14.3 14.4; 15- 15.1

    15.2 15.3

    RW-4 To teach about thegeneration anddistribution of publickeys and symmetric keysas well as theirmanagement.

    Students will learn thedifference betweensymmetric keys andasymmetric keycryptography.

    Images from slides andvideo lectures can beused.

    SPILL OVERWeek 11 Lecture 21 Spill Over

    Scheme for CA:Component Frequency Out Of Each Marks Total Marks

    Term Paper,Quiz,Test 2 3 10 20Total :- 10 20

    Details of Academic Task(s)

  • AT No. Objective Topic of the Academic Task Nature of Academic Task(group/individuals/field

    work

    Evaluation Mode Allottment / submission Week

    Term Paper1 Understanding how to write a technical paper.

    A topic will be assigned to each student on which proper study will be carried out by the students and the conclusions will be presented in the form of a technical paper.

    Individual Based on the student's performance in the completion of the term paper.

    4 / 15

    Quiz1 To test the knowledge of students based on the lectures taught till lecture 10.

    A quiz that consists multiple choice questions, fill in the blanks and one work answers. Multiple set of questions must be prepared to avoid cheating during the quiz.

    Individual Evaluation on the basis of performance of the students in the quiz

    7 / 8

    Test1 To test the knowledge of students based on the lectures taught till lecture 19.

    A test that consists short answer type and long answer type questions.

    Individual Evaluation on the basis of performance of the student in the test.

    12 / 13

    List of suggested topics for term paper[at least 15] (Student to spend about 15 hrs on any one specified term paper)

    Sr. No. Topic

    1 Advanced Encryption Standard

    2 Diffie-Hellman Key Exchange

    3 Elliptic Curve Cryptography

    4 Block Ciphers and the Data Encryption Standard

    5 Digital Signature Standard

    6 Digital Signatures Authentication Protocols

    7 Security Problems in the TCP/IP Protocol Suite

    8 Privacy Enhancement for Internet Electronic Mail

    9 Kerberos

    10 Pretty Good Privacy

    11 IP Security Architecture

    12 Secure Electronic Transaction

    13 Secure Socket Layer

    14 Language based security

    15 Block Cipher Design Principles

    16 Message Authentication

    17 The Code Red Worm

  • 18 Academic Freedom and the Hacker Ethic

    19 SNORT Intrusion Detection System

    20 Achieving Electronic Privacy

    21 The tiny encryption algorithm

    22 The Block Cipher Square

    23 Tiger: A fast new hash function

    24 Data Encryption Standard