0% found this document useful (0 votes)
312 views2 pages

Lesson Plan IT2352 CNS

This lesson plan outlines the topics to be covered in a course on Cryptography and Network Security over 5 units. Unit I covers security trends, classical cryptography systems, number theory and finite fields. Unit II covers simple and triple DES, AES, RSA, attacks and primality tests. Unit III discusses discrete logarithms, Diffie-Hellman key exchange, public key cryptosystems, hash functions and digital signatures. Unit IV focuses on authentication applications like Kerberos. Unit V examines system security, intruders, malware, firewalls and security standards.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
312 views2 pages

Lesson Plan IT2352 CNS

This lesson plan outlines the topics to be covered in a course on Cryptography and Network Security over 5 units. Unit I covers security trends, classical cryptography systems, number theory and finite fields. Unit II covers simple and triple DES, AES, RSA, attacks and primality tests. Unit III discusses discrete logarithms, Diffie-Hellman key exchange, public key cryptosystems, hash functions and digital signatures. Unit IV focuses on authentication applications like Kerberos. Unit V examines system security, intruders, malware, firewalls and security standards.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

HINDUSTHAN INSTITUTE OF TECHNOLOGY

COIMBATORE -32 LESSON PLAN Subject Code / Title: IT2352 CRYPTOGRAPHY AND NETWORK SECURITY Class : III B.Tech (IT) S.No. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 TOPICS Text/Reference T1 T1 T1 T1 T1 T1 T1 T1 T1 T2 T2/R1 T2/R1 T2/R1 T2 T2 T2 T2 T2 T2/R1 T2 T2 T2 T2 T2/R1 T2 T2 T2 T2/R1

UNIT I
Security trends Attacks and services Classical crypto systems Different types of ciphers LFSR sequences Basic Number theory Congruences Chinese Remainder theorem Modular exponentiation Fermat and Euler's theorem Legendre and Jacobi symbols Finite fields , continued fractions

UNIT II
Simple DES Differential cryptoanalysis DES, Modes of operation Triple DES AES RC4 RSA Attacks Primality test Factoring

UNIT III
Discrete Logarithms , Computing discrete logs Diffie-Hellman key exchange ElGamal Public key cryptosystems Hash functions , Secure Hash Birthday attacks MD5 Digital signatures RSA ElGamal DSA

UNIT IV
Authentication applications, Kerberos

29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45

X.509, PKI Electronic Mail security PGP S/MIME IP security Web Security SSL TLS, SET

T2 T2 T2 T2/R1 T2 T2 T2/R1 T2

UNIT V
System security Intruders Malicious software Malicious software , List Operations Viruses , Worms , Advanced Anti-Virus Techniques Firewalls Configuration Firewalls , List Mode of Operation , Uses Security Standards. Security Methodologies and Measures T2 T2 T2 T2 T2 T2 T2 T2 T2

TEXT BOOKS: 1. Wade Trappe, Lawrence C Washington, Introduction to Cryptography with coding theory, 2nd Edition, Pearson, 2007. 2. William Stallings, Crpyptography and Network security Principles and Practices, Pearson/PHI, 4th edition, 2006. REFERENCES: 1. W. Mao, Modern Cryptography Theory and Practice, Pearson Education, Second Edition, 2007. 2. Charles P. Pfleeger, Shari Lawrence Pfleeger Security in computing Third Edition Prentice Hall of India, 2006

Staff In charge

HOD-IT

Principal

You might also like