Cns Lecture Plan

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

MVN UNIVERSITY

Depatment of Computer Science and Engineering


LESSON PLAN
Semester:B.Tech 7th sem (CSE)
Subject: Cryptography and Network Security (CSL-404)
Weekly Lesson Plan
SR
.
No

wee
k

Lecture Lecture topic


/Tutorial

Date

SECTION-A
st

1
1

L1

Introduction to the subject, its prerequisites ,objectives ,content and plan


of study
SECTION A
UNIT 1: Security Attacks (Interruption,

Interception, Modification and Fabrication


L2
2

L3

T1

5
6

2nd

L4
L5

Security
Services
(Confidentiality,
Authentication,
Integrity,
Nonrepudiation,
access
Control
and
Availability) and Mechanisms
Discussion based on types of security
attacks with example
TCP(Transmission Control Protocol)
session hijacking, ARP(Address resolution
Protocol) attacks,
route table modification,

Sign

UDP hijacking
7

L6

T2

Discussion based on ARP and UDP(User


Datagram Protocol) attacks
man-in-the-middle attacks

rd

10

L7

L8

UNIT 2:Introduction to Conventional


Encryption
Principles,
Conventional
encryption algorithms, , , key distribution
Approaches of Message Authentication,
Secure Hash Functions and HMAC
cipher block modes of operation

11

L9

12

T3

Discussion based on types of encryption


algorithm
location of encryption devices

13

th

L10

14

L11

key distribution Approaches of Message


Authentication

15

L12

Secure Hash Functions and HMAC(hash


message authentication code)

16

T4

Practice on different types of Hash


function

L13

Continue with Hash Functions and


HMAC

L14

UNIT3: Public key


Algorithms, examples.

5th
17
18

Cryptography:

19

L15

20

T5

Modular arithmetic (addition,


multiplication, inverse, and
exponentiation)
Problem based on Modular arithmetic

L16

RSA: generating keys, encryption and


decryption

22

L17

PKCS(Public Key Crypto System)


algorithm

23

L18

Diffile-Hellman Algorithm, El Gamal


signatures

24

T6

Practice based on numerical problems

L19

DSS (Digital Signature Standard) , Zero


knowledge signatures.

26

L20

UNIT 4:Authentication:
Based, Address Based

27

L21

Passwords in distributed systems, online


vs. offline guessing, storing

28

T7

21

25

29

6th

7th

8th

L22

30

L23

31

L24

Password

Cryptographic Authentication: passwords


as keys, protocols
KDCs (Key distribution center
) Certification Revocation, Inter domain,
groups, delegation
Authentication of People: Verification
techniques, passwords, length of
passwords, password distribution

Discussion on Digital signature


32

T8

Introduction to smart cards, biometrics


33

9th

L25
UNIT 5: IP Security Overview

34

L26

35

L27

IP Security Architecture, Authentication


Header
Practice based on numerical problems

36

T9
Encapsulating Security Payload

37

10th

38

L28
L29

Combining Security Associations


Key Management

39

L30

40

T10
L31

UNIT 6:Introduction to Firewall and


needs

42

L32

Types of Firewall

43

L33

Firewall Design principles

44

T11

Practice based on numerical problems

41

th

11

Trusted Systems
45

12

th

L34

Intrusion Detection Systems


L35

46

Revision of UNIT 1 and UNIT 2


47

L36

48

T12

Practice based on numerical problems


Revision of UNIT 3 and UNIT 4

49

13th

L37
Revision of UNIT 5 and UNIT 6

50

L38

51

L39

Revision on previous year question paper

Revision on previous year question paper

T13

52

Revision on previous year question paper


53

14th

L40

Teaching methodology: - Chalk and talk, Power point, Discussion, Expert lecture, Online quiz.

You might also like